Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-33909 (GCVE-0-2021-33909)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:05:52.143Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"name": "DSA-4941",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"name": "FEDORA-2021-07dc0b3eb1",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"name": "[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"name": "[oss-security] 20210825 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-09T21:06:18",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"name": "DSA-4941",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"name": "FEDORA-2021-07dc0b3eb1",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"name": "[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"name": "[oss-security] 20210825 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33909",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"name": "DSA-4941",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"name": "FEDORA-2021-07dc0b3eb1",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"name": "[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"name": "[oss-security] 20210825 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"refsource": "MISC",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"name": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
"refsource": "CONFIRM",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"name": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"name": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210819-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-33909",
"datePublished": "2021-07-20T18:01:34",
"dateReserved": "2021-06-07T00:00:00",
"dateUpdated": "2024-08-04T00:05:52.143Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-33909\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-07-20T19:15:09.747\",\"lastModified\":\"2024-11-21T06:09:45.353\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.\"},{\"lang\":\"es\",\"value\":\"Un archivo fs/seq_file.c en el kernel de Linux versiones 3.16 hasta 5.13.x anteriores a 5.13.4, no restringe apropiadamente las asignaciones de b\u00faferes seq, conllevando a un desbordamiento de enteros, una escritura fuera de l\u00edmites y una escalada a root por parte de un usuario no privilegiado, tambi\u00e9n se conoce como CID-8cae8cd89f05\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.12.43\",\"versionEndExcluding\":\"3.13\",\"matchCriteriaId\":\"39C4F3AF-A0E2-4B5A-8CEF-94A66639E158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.16\",\"versionEndExcluding\":\"4.4.276\",\"matchCriteriaId\":\"EC5597FD-F068-49B5-99FE-8CDB79CD7682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.276\",\"matchCriteriaId\":\"C79FFC06-9530-4CD7-B651-01D786CC925E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.240\",\"matchCriteriaId\":\"FB359B2E-773D-4D52-9915-E07A47ABE72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.198\",\"matchCriteriaId\":\"B93AEDB9-C52B-4222-8F9A-882DAD9EF5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.134\",\"matchCriteriaId\":\"508D9771-335F-44A6-9F2F-880DF1267A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.52\",\"matchCriteriaId\":\"7C1E6FB6-53C8-4DC4-8AE5-93094BA39F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12.19\",\"matchCriteriaId\":\"34C1A2F4-DD44-4CF1-8FD4-751A0D746A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.13\",\"versionEndExcluding\":\"5.13.4\",\"matchCriteriaId\":\"F93FA3CC-0C79-410B-A7D7-245C2AA0723A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9F6415-2950-49FE-9CAF-8BCA4DB6DF4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05190B9-237F-4E2E-91EA-DB1B738864AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C416FD3-2E2F-4BBC-BD5F-F896825883F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D886339E-EDB2-4879-BD54-1800E4CA9CAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"12.4.2-02044\",\"matchCriteriaId\":\"7F4BE1A7-14AA-4E0F-AA13-46D3B9D48F2F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:sma1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB78952C-B6BB-4A5A-A216-BA64AAC83D4D\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/07/22/7\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/25/10\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/17/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/17/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/21/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210819-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4941\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/07/20/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/07/22/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/25/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/17/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/17/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/21/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210819-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4941\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/07/20/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
opensuse-su-2021:3876-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n- CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes (bnc#1190479).\n- CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2021-3759: Unaccounted ipc objects could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).\n- CVE-2021-3752: Fixed a use after free vulnerability in the bluetooth module. (bsc#1190023)\n- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2020-12770: An issue was discovered in the Linux kernel sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040 (bnc#1171420).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario (bnc#1133374).\n- CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. (bnc#1129898).\n- CVE-2018-9517: In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108488).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#0 bnc#1177666 bnc#1181158).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).\n- CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bnc#1186482 bnc#1190276).\n- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062 bnc#1188063).\n\nThe following non-security bugs were fixed:\n\n- Add arch-dependent support markers in supported.conf (bsc#1186672) \n- Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1191888).\n- config: disable unprivileged BPF by default (jsc#SLE-22913)\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- hisax: fix spectre issues (bsc#1192802).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).\n- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mm/memory.c: do_fault: avoid usage of stale vm_area_struct (bsc#1136513).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).\n- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).\n- Revert \u0027memcg: enable accounting for file lock caches (bsc#1190115).\u0027 This reverts commit 912b4421a3e9bb9f0ef1aadc64a436666259bd4d. It\u0027s effectively upstream commit 3754707bcc3e190e5dadc978d172b61e809cb3bd applied to kernel-source (to avoid proliferation of patches). Make a note in blacklist.conf too.\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scripts/git_sort/git_sort.py: Update nvme repositories\n- scsi: libfc: Fix array index out of bound exception (bsc#1188616).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1191349).\n- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349 bsc#1191457).\n- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1191349 bsc#1191457).\n- scsi: target: avoid using lun_tg_pt_gp after unlock (bsc#1186078).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- target: core: Fix sense key for invalid XCOPY request (bsc#1186078).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- UsrMerge the kernel (boo#1184804)\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3876",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3876-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3876-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3876-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/"
},
{
"category": "self",
"summary": "SUSE Bug 1100416",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "self",
"summary": "SUSE Bug 1108488",
"url": "https://bugzilla.suse.com/1108488"
},
{
"category": "self",
"summary": "SUSE Bug 1129735",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "self",
"summary": "SUSE Bug 1129898",
"url": "https://bugzilla.suse.com/1129898"
},
{
"category": "self",
"summary": "SUSE Bug 1133374",
"url": "https://bugzilla.suse.com/1133374"
},
{
"category": "self",
"summary": "SUSE Bug 1136513",
"url": "https://bugzilla.suse.com/1136513"
},
{
"category": "self",
"summary": "SUSE Bug 1171420",
"url": "https://bugzilla.suse.com/1171420"
},
{
"category": "self",
"summary": "SUSE Bug 1176724",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1181158",
"url": "https://bugzilla.suse.com/1181158"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185377",
"url": "https://bugzilla.suse.com/1185377"
},
{
"category": "self",
"summary": "SUSE Bug 1185726",
"url": "https://bugzilla.suse.com/1185726"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185973",
"url": "https://bugzilla.suse.com/1185973"
},
{
"category": "self",
"summary": "SUSE Bug 1186078",
"url": "https://bugzilla.suse.com/1186078"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186482",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188172",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1188616",
"url": "https://bugzilla.suse.com/1188616"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188983",
"url": "https://bugzilla.suse.com/1188983"
},
{
"category": "self",
"summary": "SUSE Bug 1188985",
"url": "https://bugzilla.suse.com/1188985"
},
{
"category": "self",
"summary": "SUSE Bug 1189057",
"url": "https://bugzilla.suse.com/1189057"
},
{
"category": "self",
"summary": "SUSE Bug 1189262",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "self",
"summary": "SUSE Bug 1189291",
"url": "https://bugzilla.suse.com/1189291"
},
{
"category": "self",
"summary": "SUSE Bug 1189399",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "self",
"summary": "SUSE Bug 1189400",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "self",
"summary": "SUSE Bug 1189706",
"url": "https://bugzilla.suse.com/1189706"
},
{
"category": "self",
"summary": "SUSE Bug 1189846",
"url": "https://bugzilla.suse.com/1189846"
},
{
"category": "self",
"summary": "SUSE Bug 1189884",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "self",
"summary": "SUSE Bug 1190023",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "self",
"summary": "SUSE Bug 1190025",
"url": "https://bugzilla.suse.com/1190025"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190115",
"url": "https://bugzilla.suse.com/1190115"
},
{
"category": "self",
"summary": "SUSE Bug 1190117",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "self",
"summary": "SUSE Bug 1190159",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "self",
"summary": "SUSE Bug 1190276",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "self",
"summary": "SUSE Bug 1190349",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190479",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "self",
"summary": "SUSE Bug 1190534",
"url": "https://bugzilla.suse.com/1190534"
},
{
"category": "self",
"summary": "SUSE Bug 1190601",
"url": "https://bugzilla.suse.com/1190601"
},
{
"category": "self",
"summary": "SUSE Bug 1190717",
"url": "https://bugzilla.suse.com/1190717"
},
{
"category": "self",
"summary": "SUSE Bug 1191193",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191317",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "self",
"summary": "SUSE Bug 1191349",
"url": "https://bugzilla.suse.com/1191349"
},
{
"category": "self",
"summary": "SUSE Bug 1191457",
"url": "https://bugzilla.suse.com/1191457"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191800",
"url": "https://bugzilla.suse.com/1191800"
},
{
"category": "self",
"summary": "SUSE Bug 1191888",
"url": "https://bugzilla.suse.com/1191888"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192379",
"url": "https://bugzilla.suse.com/1192379"
},
{
"category": "self",
"summary": "SUSE Bug 1192400",
"url": "https://bugzilla.suse.com/1192400"
},
{
"category": "self",
"summary": "SUSE Bug 1192775",
"url": "https://bugzilla.suse.com/1192775"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13405 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3874 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3900 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0429 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12770 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-4788 page",
"url": "https://www.suse.com/security/cve/CVE-2020-4788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22543 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34556 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35477 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3679 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3732 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3752 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3764 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38160 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-40490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-40490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41864 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-02T07:19:22Z",
"generator": {
"date": "2021-12-02T07:19:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3876-1",
"initial_release_date": "2021-12-02T07:19:22Z",
"revision_history": [
{
"date": "2021-12-02T07:19:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-man-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-13405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13405"
}
],
"notes": [
{
"category": "general",
"text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13405",
"url": "https://www.suse.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1100416 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "external",
"summary": "SUSE Bug 1129735 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "external",
"summary": "SUSE Bug 1195161 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1195161"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2018-9517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9517"
}
],
"notes": [
{
"category": "general",
"text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9517",
"url": "https://www.suse.com/security/cve/CVE-2018-9517"
},
{
"category": "external",
"summary": "SUSE Bug 1108488 for CVE-2018-9517",
"url": "https://bugzilla.suse.com/1108488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "low"
}
],
"title": "CVE-2018-9517"
},
{
"cve": "CVE-2019-3874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3874"
}
],
"notes": [
{
"category": "general",
"text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3874",
"url": "https://www.suse.com/security/cve/CVE-2019-3874"
},
{
"category": "external",
"summary": "SUSE Bug 1129898 for CVE-2019-3874",
"url": "https://bugzilla.suse.com/1129898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-3874"
},
{
"cve": "CVE-2019-3900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3900"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3900",
"url": "https://www.suse.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "SUSE Bug 1133374 for CVE-2019-3900",
"url": "https://bugzilla.suse.com/1133374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "low"
}
],
"title": "CVE-2019-3900"
},
{
"cve": "CVE-2020-0429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0429"
}
],
"notes": [
{
"category": "general",
"text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0429",
"url": "https://www.suse.com/security/cve/CVE-2020-0429"
},
{
"category": "external",
"summary": "SUSE Bug 1176724 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "external",
"summary": "SUSE Bug 1176931 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "external",
"summary": "SUSE Bug 1188026 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1188026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2020-0429"
},
{
"cve": "CVE-2020-12770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12770"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12770",
"url": "https://www.suse.com/security/cve/CVE-2020-12770"
},
{
"category": "external",
"summary": "SUSE Bug 1171420 for CVE-2020-12770",
"url": "https://bugzilla.suse.com/1171420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2020-12770"
},
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2020-4788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-4788"
}
],
"notes": [
{
"category": "general",
"text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-4788",
"url": "https://www.suse.com/security/cve/CVE-2020-4788"
},
{
"category": "external",
"summary": "SUSE Bug 1177666 for CVE-2020-4788",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "external",
"summary": "SUSE Bug 1181158 for CVE-2020-4788",
"url": "https://bugzilla.suse.com/1181158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2020-4788"
},
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-22543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22543"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22543",
"url": "https://www.suse.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "SUSE Bug 1186482 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "external",
"summary": "SUSE Bug 1186483 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1197660 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1197660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34556"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34556",
"url": "https://www.suse.com/security/cve/CVE-2021-34556"
},
{
"category": "external",
"summary": "SUSE Bug 1188983 for CVE-2021-34556",
"url": "https://bugzilla.suse.com/1188983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-34556"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-35477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35477"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35477",
"url": "https://www.suse.com/security/cve/CVE-2021-35477"
},
{
"category": "external",
"summary": "SUSE Bug 1188985 for CVE-2021-35477",
"url": "https://bugzilla.suse.com/1188985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-35477"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-3679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3679"
}
],
"notes": [
{
"category": "general",
"text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3679",
"url": "https://www.suse.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "SUSE Bug 1189057 for CVE-2021-3679",
"url": "https://bugzilla.suse.com/1189057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3679"
},
{
"cve": "CVE-2021-3715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3715"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3715",
"url": "https://www.suse.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "SUSE Bug 1190349 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "external",
"summary": "SUSE Bug 1190350 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190350"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1196722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3732",
"url": "https://www.suse.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "SUSE Bug 1189706 for CVE-2021-3732",
"url": "https://bugzilla.suse.com/1189706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3732"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3752"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3752",
"url": "https://www.suse.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "SUSE Bug 1190023 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "external",
"summary": "SUSE Bug 1190432 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3764"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3764",
"url": "https://www.suse.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3764",
"url": "https://bugzilla.suse.com/1190534"
},
{
"category": "external",
"summary": "SUSE Bug 1194518 for CVE-2021-3764",
"url": "https://bugzilla.suse.com/1194518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3764"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-38160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38160"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38160",
"url": "https://www.suse.com/security/cve/CVE-2021-38160"
},
{
"category": "external",
"summary": "SUSE Bug 1190117 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "external",
"summary": "SUSE Bug 1190118 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190118"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-38160"
},
{
"cve": "CVE-2021-38198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38198"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38198",
"url": "https://www.suse.com/security/cve/CVE-2021-38198"
},
{
"category": "external",
"summary": "SUSE Bug 1189262 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "external",
"summary": "SUSE Bug 1189278 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-38198"
},
{
"cve": "CVE-2021-38204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38204"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38204",
"url": "https://www.suse.com/security/cve/CVE-2021-38204"
},
{
"category": "external",
"summary": "SUSE Bug 1189291 for CVE-2021-38204",
"url": "https://bugzilla.suse.com/1189291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-40490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-40490"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-40490",
"url": "https://www.suse.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "SUSE Bug 1190159 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "external",
"summary": "SUSE Bug 1192775 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1192775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-40490"
},
{
"cve": "CVE-2021-41864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41864"
}
],
"notes": [
{
"category": "general",
"text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41864",
"url": "https://www.suse.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "SUSE Bug 1191317 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "external",
"summary": "SUSE Bug 1191318 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42252"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42252",
"url": "https://www.suse.com/security/cve/CVE-2021-42252"
},
{
"category": "external",
"summary": "SUSE Bug 1190479 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "external",
"summary": "SUSE Bug 1192444 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1192444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-42252"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:22Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
}
]
}
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-5.14.6-1.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10728",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12153 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14051 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16648 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17852 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17853 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17854 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17855 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5123 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10322 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1068 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12232 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12714 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18710 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14615 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14896 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15504 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19252 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3887 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8912 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10766 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10767 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12351 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12352 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25639 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25656 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25668 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2732 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29660 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29661 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8694 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26708 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38166 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38166/"
}
],
"title": "kernel-devel-5.14.6-1.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10728-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-devel-5.14.6-1.4.aarch64",
"product_id": "kernel-devel-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-macros-5.14.6-1.4.aarch64",
"product_id": "kernel-macros-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-source-5.14.6-1.4.aarch64",
"product_id": "kernel-source-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-devel-5.14.6-1.4.ppc64le",
"product_id": "kernel-devel-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-macros-5.14.6-1.4.ppc64le",
"product_id": "kernel-macros-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-source-5.14.6-1.4.ppc64le",
"product_id": "kernel-source-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.s390x",
"product": {
"name": "kernel-devel-5.14.6-1.4.s390x",
"product_id": "kernel-devel-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.s390x",
"product": {
"name": "kernel-macros-5.14.6-1.4.s390x",
"product_id": "kernel-macros-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.s390x",
"product": {
"name": "kernel-source-5.14.6-1.4.s390x",
"product_id": "kernel-source-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.s390x",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.s390x",
"product_id": "kernel-source-vanilla-5.14.6-1.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-devel-5.14.6-1.4.x86_64",
"product_id": "kernel-devel-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-macros-5.14.6-1.4.x86_64",
"product_id": "kernel-macros-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-source-5.14.6-1.4.x86_64",
"product_id": "kernel-source-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-devel-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-devel-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x"
},
"product_reference": "kernel-devel-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-devel-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-macros-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-macros-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x"
},
"product_reference": "kernel-macros-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-macros-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-source-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-source-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x"
},
"product_reference": "kernel-source-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-source-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-12153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12153"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12153",
"url": "https://www.suse.com/security/cve/CVE-2017-12153"
},
{
"category": "external",
"summary": "SUSE Bug 1058410 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058410"
},
{
"category": "external",
"summary": "SUSE Bug 1058624 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12153"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-14051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14051"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14051",
"url": "https://www.suse.com/security/cve/CVE-2017-14051"
},
{
"category": "external",
"summary": "SUSE Bug 1056588 for CVE-2017-14051",
"url": "https://bugzilla.suse.com/1056588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14051"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16647"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16647",
"url": "https://www.suse.com/security/cve/CVE-2017-16647"
},
{
"category": "external",
"summary": "SUSE Bug 1067102 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1067102"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16647"
},
{
"cve": "CVE-2017-16648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16648"
}
],
"notes": [
{
"category": "general",
"text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16648",
"url": "https://www.suse.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "SUSE Bug 1067087 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1067087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16648"
},
{
"cve": "CVE-2017-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16995"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16995",
"url": "https://www.suse.com/security/cve/CVE-2017-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16995",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16995"
},
{
"cve": "CVE-2017-16996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16996"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16996",
"url": "https://www.suse.com/security/cve/CVE-2017-16996"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16996",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16996"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17852"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17852",
"url": "https://www.suse.com/security/cve/CVE-2017-17852"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17852",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17852"
},
{
"cve": "CVE-2017-17853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17853"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17853",
"url": "https://www.suse.com/security/cve/CVE-2017-17853"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17853",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17853"
},
{
"cve": "CVE-2017-17854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17854"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17854",
"url": "https://www.suse.com/security/cve/CVE-2017-17854"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17854",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17854"
},
{
"cve": "CVE-2017-17855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17855"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17855",
"url": "https://www.suse.com/security/cve/CVE-2017-17855"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17855",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17855"
},
{
"cve": "CVE-2017-17856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17856"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17856",
"url": "https://www.suse.com/security/cve/CVE-2017-17856"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17856",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17856"
},
{
"cve": "CVE-2017-17857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17857"
}
],
"notes": [
{
"category": "general",
"text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17857",
"url": "https://www.suse.com/security/cve/CVE-2017-17857"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17857",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17857"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-5123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5123"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5123",
"url": "https://www.suse.com/security/cve/CVE-2017-5123"
},
{
"category": "external",
"summary": "SUSE Bug 1062473 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1062473"
},
{
"category": "external",
"summary": "SUSE Bug 1122971 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1122971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5123"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-10322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10322"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10322",
"url": "https://www.suse.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090749 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1090749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10322"
},
{
"cve": "CVE-2018-10323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10323"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10323",
"url": "https://www.suse.com/security/cve/CVE-2018-10323"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090717 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1090717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1068"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1068",
"url": "https://www.suse.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "SUSE Bug 1085107 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "external",
"summary": "SUSE Bug 1085114 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085114"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1123903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-12232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12232"
}
],
"notes": [
{
"category": "general",
"text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12232",
"url": "https://www.suse.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097593 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1097593"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1127757 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1127757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12232"
},
{
"cve": "CVE-2018-12714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12714"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12714",
"url": "https://www.suse.com/security/cve/CVE-2018-12714"
},
{
"category": "external",
"summary": "SUSE Bug 1098933 for CVE-2018-12714",
"url": "https://bugzilla.suse.com/1098933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12714"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-18710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18710",
"url": "https://www.suse.com/security/cve/CVE-2018-18710"
},
{
"category": "external",
"summary": "SUSE Bug 1113751 for CVE-2018-18710",
"url": "https://bugzilla.suse.com/1113751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18710"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-14615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14615",
"url": "https://www.suse.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "SUSE Bug 1160195 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1160195"
},
{
"category": "external",
"summary": "SUSE Bug 1165881 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1165881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14615"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14896"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14896",
"url": "https://www.suse.com/security/cve/CVE-2019-14896"
},
{
"category": "external",
"summary": "SUSE Bug 1157157 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1157157"
},
{
"category": "external",
"summary": "SUSE Bug 1160468 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1160468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14896"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15504"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15504",
"url": "https://www.suse.com/security/cve/CVE-2019-15504"
},
{
"category": "external",
"summary": "SUSE Bug 1147116 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1147116"
},
{
"category": "external",
"summary": "SUSE Bug 1185852 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1185852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15504"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18812"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18812",
"url": "https://www.suse.com/security/cve/CVE-2019-18812"
},
{
"category": "external",
"summary": "SUSE Bug 1156277 for CVE-2019-18812",
"url": "https://bugzilla.suse.com/1156277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18812"
},
{
"cve": "CVE-2019-18813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18813"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18813",
"url": "https://www.suse.com/security/cve/CVE-2019-18813"
},
{
"category": "external",
"summary": "SUSE Bug 1156278 for CVE-2019-18813",
"url": "https://bugzilla.suse.com/1156278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18813"
},
{
"cve": "CVE-2019-19252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19252"
}
],
"notes": [
{
"category": "general",
"text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19252",
"url": "https://www.suse.com/security/cve/CVE-2019-19252"
},
{
"category": "external",
"summary": "SUSE Bug 1157813 for CVE-2019-19252",
"url": "https://bugzilla.suse.com/1157813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19252"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3016"
}
],
"notes": [
{
"category": "general",
"text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3016",
"url": "https://www.suse.com/security/cve/CVE-2019-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1161154 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1161154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3016"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-3887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3887"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3887",
"url": "https://www.suse.com/security/cve/CVE-2019-3887"
},
{
"category": "external",
"summary": "SUSE Bug 1131800 for CVE-2019-3887",
"url": "https://bugzilla.suse.com/1131800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3887"
},
{
"cve": "CVE-2019-6974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6974",
"url": "https://www.suse.com/security/cve/CVE-2019-6974"
},
{
"category": "external",
"summary": "SUSE Bug 1124728 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124728"
},
{
"category": "external",
"summary": "SUSE Bug 1124729 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-6974"
},
{
"cve": "CVE-2019-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7221"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7221",
"url": "https://www.suse.com/security/cve/CVE-2019-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1124732 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124732"
},
{
"category": "external",
"summary": "SUSE Bug 1124734 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-7221"
},
{
"cve": "CVE-2019-7222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7222"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7222",
"url": "https://www.suse.com/security/cve/CVE-2019-7222"
},
{
"category": "external",
"summary": "SUSE Bug 1124735 for CVE-2019-7222",
"url": "https://bugzilla.suse.com/1124735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-7222"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-8912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8912",
"url": "https://www.suse.com/security/cve/CVE-2019-8912"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1126284 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1126284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8912"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-10766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10766"
}
],
"notes": [
{
"category": "general",
"text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10766",
"url": "https://www.suse.com/security/cve/CVE-2020-10766"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1172781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10766"
},
{
"cve": "CVE-2020-10767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10767"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10767",
"url": "https://www.suse.com/security/cve/CVE-2020-10767"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1172782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10767"
},
{
"cve": "CVE-2020-10768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10768"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10768",
"url": "https://www.suse.com/security/cve/CVE-2020-10768"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1172783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-12351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12351"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12351",
"url": "https://www.suse.com/security/cve/CVE-2020-12351"
},
{
"category": "external",
"summary": "SUSE Bug 1177724 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177724"
},
{
"category": "external",
"summary": "SUSE Bug 1177729 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177729"
},
{
"category": "external",
"summary": "SUSE Bug 1178397 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1178397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-12351"
},
{
"cve": "CVE-2020-12352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12352"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12352",
"url": "https://www.suse.com/security/cve/CVE-2020-12352"
},
{
"category": "external",
"summary": "SUSE Bug 1177725 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1177725"
},
{
"category": "external",
"summary": "SUSE Bug 1178398 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1178398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12352"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14386"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14386",
"url": "https://www.suse.com/security/cve/CVE-2020-14386"
},
{
"category": "external",
"summary": "SUSE Bug 1176069 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176069"
},
{
"category": "external",
"summary": "SUSE Bug 1176072 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14386"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25639"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25639",
"url": "https://www.suse.com/security/cve/CVE-2020-25639"
},
{
"category": "external",
"summary": "SUSE Bug 1176846 for CVE-2020-25639",
"url": "https://bugzilla.suse.com/1176846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25639"
},
{
"cve": "CVE-2020-25656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25656",
"url": "https://www.suse.com/security/cve/CVE-2020-25656"
},
{
"category": "external",
"summary": "SUSE Bug 1177766 for CVE-2020-25656",
"url": "https://bugzilla.suse.com/1177766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25656"
},
{
"cve": "CVE-2020-25668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25668",
"url": "https://www.suse.com/security/cve/CVE-2020-25668"
},
{
"category": "external",
"summary": "SUSE Bug 1178123 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178123"
},
{
"category": "external",
"summary": "SUSE Bug 1178622 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178622"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25668"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-2732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2732",
"url": "https://www.suse.com/security/cve/CVE-2020-2732"
},
{
"category": "external",
"summary": "SUSE Bug 1163971 for CVE-2020-2732",
"url": "https://bugzilla.suse.com/1163971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2732"
},
{
"cve": "CVE-2020-29660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29660"
}
],
"notes": [
{
"category": "general",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29660",
"url": "https://www.suse.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29661"
}
],
"notes": [
{
"category": "general",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29661",
"url": "https://www.suse.com/security/cve/CVE-2020-29661"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179877"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2020-8648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8648"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8648",
"url": "https://www.suse.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "SUSE Bug 1162928 for CVE-2020-8648",
"url": "https://bugzilla.suse.com/1162928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8694"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8694",
"url": "https://www.suse.com/security/cve/CVE-2020-8694"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178700 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178700"
},
{
"category": "external",
"summary": "SUSE Bug 1179661 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1179661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-26708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26708"
}
],
"notes": [
{
"category": "general",
"text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26708",
"url": "https://www.suse.com/security/cve/CVE-2021-26708"
},
{
"category": "external",
"summary": "SUSE Bug 1181806 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1181806"
},
{
"category": "external",
"summary": "SUSE Bug 1183298 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1183298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-26708"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-32606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32606",
"url": "https://www.suse.com/security/cve/CVE-2021-32606"
},
{
"category": "external",
"summary": "SUSE Bug 1185953 for CVE-2021-32606",
"url": "https://bugzilla.suse.com/1185953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32606"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-38166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38166"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38166",
"url": "https://www.suse.com/security/cve/CVE-2021-38166"
},
{
"category": "external",
"summary": "SUSE Bug 1189233 for CVE-2021-38166",
"url": "https://bugzilla.suse.com/1189233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-38166"
}
]
}
opensuse-su-2021:1076-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write affecting Linux was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).\n- CVE-2021-35039: kernel/module.c in the Linux kernel mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).\n- blk-mq: In blk_mq_dispatch_rq_list() \u0027no budget\u0027 is a reason to kick (bsc#1180092).\n- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).\n- blk-mq: insert passthrough request into hctx-\u003edispatch directly (bsc#1180092).\n- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).\n- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- bpftool: Properly close va_list \u0027ap\u0027 by va_end() on error (bsc#1155518).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- fbmem: Do not delete the mode that is still in use (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1076",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1076-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1076-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1076-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1180092",
"url": "https://bugzilla.suse.com/1180092"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188445",
"url": "https://bugzilla.suse.com/1188445"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T06:35:11Z",
"generator": {
"date": "2021-07-22T06:35:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1076-1",
"initial_release_date": "2021-07-22T06:35:11Z",
"revision_history": [
{
"date": "2021-07-22T06:35:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-devel-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-docs-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-docs-html-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-macros-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-source-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-source-5.3.18-lp152.84.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-debug-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-default-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product_id": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-preempt-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-lp152.84.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-lp152.84.1.x86_64",
"product_id": "kernel-syms-5.3.18-lp152.84.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-source-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-lp152.84.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-lp152.84.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "important"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.84.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.84.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.84.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T06:35:11Z",
"details": "moderate"
}
],
"title": "CVE-2021-3612"
}
]
}
opensuse-su-2021:2415-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nSecurity issues fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2415",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2415-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2415-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2415-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T14:11:51Z",
"generator": {
"date": "2021-07-20T14:11:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2415-1",
"initial_release_date": "2021-07-20T14:11:51Z",
"revision_history": [
{
"date": "2021-07-20T14:11:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product_id": "kernel-devel-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product_id": "kernel-macros-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product_id": "kernel-syms-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:11:51Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.16.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:11:51Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-longterm-6.6.17-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13704",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12153 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14051 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16648 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17852 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17853 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17854 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17855 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5123 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10322 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1068 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12232 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12714 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18710 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14615 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14896 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15504 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19252 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3887 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8912 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10766 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10767 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12351 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12352 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25639 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25656 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25668 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2732 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29660 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29661 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8694 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26708 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38166 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43976 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0330 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0847 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1852 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1972 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1973 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2308 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24958 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2590 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26490 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28388 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28389 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28390 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28893 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29968 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29968/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4379 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44032 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44033 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44034 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45884 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45885 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45887 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0045 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1076 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1078 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1192 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1380 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-31084 page",
"url": "https://www.suse.com/security/cve/CVE-2023-31084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3141 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3269 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39192 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39193 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4128 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4134 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4194 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42756 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4623 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46813 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5345 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6606 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6610 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6610/"
}
],
"title": "kernel-devel-longterm-6.6.17-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13704-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.aarch64",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.aarch64",
"product_id": "kernel-source-longterm-6.6.17-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.s390x",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.s390x",
"product_id": "kernel-devel-longterm-6.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.s390x",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.s390x",
"product_id": "kernel-source-longterm-6.6.17-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.x86_64",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.x86_64",
"product_id": "kernel-source-longterm-6.6.17-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-12153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12153"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12153",
"url": "https://www.suse.com/security/cve/CVE-2017-12153"
},
{
"category": "external",
"summary": "SUSE Bug 1058410 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058410"
},
{
"category": "external",
"summary": "SUSE Bug 1058624 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12153"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-14051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14051"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14051",
"url": "https://www.suse.com/security/cve/CVE-2017-14051"
},
{
"category": "external",
"summary": "SUSE Bug 1056588 for CVE-2017-14051",
"url": "https://bugzilla.suse.com/1056588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14051"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16647"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16647",
"url": "https://www.suse.com/security/cve/CVE-2017-16647"
},
{
"category": "external",
"summary": "SUSE Bug 1067102 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1067102"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16647"
},
{
"cve": "CVE-2017-16648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16648"
}
],
"notes": [
{
"category": "general",
"text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16648",
"url": "https://www.suse.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "SUSE Bug 1067087 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1067087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16648"
},
{
"cve": "CVE-2017-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16995"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16995",
"url": "https://www.suse.com/security/cve/CVE-2017-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16995",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16995"
},
{
"cve": "CVE-2017-16996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16996"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16996",
"url": "https://www.suse.com/security/cve/CVE-2017-16996"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16996",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16996"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17852"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17852",
"url": "https://www.suse.com/security/cve/CVE-2017-17852"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17852",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17852"
},
{
"cve": "CVE-2017-17853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17853"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17853",
"url": "https://www.suse.com/security/cve/CVE-2017-17853"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17853",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17853"
},
{
"cve": "CVE-2017-17854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17854"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17854",
"url": "https://www.suse.com/security/cve/CVE-2017-17854"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17854",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17854"
},
{
"cve": "CVE-2017-17855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17855"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17855",
"url": "https://www.suse.com/security/cve/CVE-2017-17855"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17855",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17855"
},
{
"cve": "CVE-2017-17856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17856"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17856",
"url": "https://www.suse.com/security/cve/CVE-2017-17856"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17856",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17856"
},
{
"cve": "CVE-2017-17857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17857"
}
],
"notes": [
{
"category": "general",
"text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17857",
"url": "https://www.suse.com/security/cve/CVE-2017-17857"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17857",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17857"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-5123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5123"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5123",
"url": "https://www.suse.com/security/cve/CVE-2017-5123"
},
{
"category": "external",
"summary": "SUSE Bug 1062473 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1062473"
},
{
"category": "external",
"summary": "SUSE Bug 1122971 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1122971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5123"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-10322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10322"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10322",
"url": "https://www.suse.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090749 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1090749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10322"
},
{
"cve": "CVE-2018-10323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10323"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10323",
"url": "https://www.suse.com/security/cve/CVE-2018-10323"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090717 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1090717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1068"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1068",
"url": "https://www.suse.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "SUSE Bug 1085107 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "external",
"summary": "SUSE Bug 1085114 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085114"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1123903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-12232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12232"
}
],
"notes": [
{
"category": "general",
"text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12232",
"url": "https://www.suse.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097593 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1097593"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1127757 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1127757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12232"
},
{
"cve": "CVE-2018-12714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12714"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12714",
"url": "https://www.suse.com/security/cve/CVE-2018-12714"
},
{
"category": "external",
"summary": "SUSE Bug 1098933 for CVE-2018-12714",
"url": "https://bugzilla.suse.com/1098933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12714"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-18710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18710",
"url": "https://www.suse.com/security/cve/CVE-2018-18710"
},
{
"category": "external",
"summary": "SUSE Bug 1113751 for CVE-2018-18710",
"url": "https://bugzilla.suse.com/1113751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18710"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-14615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14615",
"url": "https://www.suse.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "SUSE Bug 1160195 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1160195"
},
{
"category": "external",
"summary": "SUSE Bug 1165881 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1165881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14615"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14896"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14896",
"url": "https://www.suse.com/security/cve/CVE-2019-14896"
},
{
"category": "external",
"summary": "SUSE Bug 1157157 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1157157"
},
{
"category": "external",
"summary": "SUSE Bug 1160468 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1160468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14896"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15504"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15504",
"url": "https://www.suse.com/security/cve/CVE-2019-15504"
},
{
"category": "external",
"summary": "SUSE Bug 1147116 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1147116"
},
{
"category": "external",
"summary": "SUSE Bug 1185852 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1185852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15504"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18812"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18812",
"url": "https://www.suse.com/security/cve/CVE-2019-18812"
},
{
"category": "external",
"summary": "SUSE Bug 1156277 for CVE-2019-18812",
"url": "https://bugzilla.suse.com/1156277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18812"
},
{
"cve": "CVE-2019-18813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18813"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18813",
"url": "https://www.suse.com/security/cve/CVE-2019-18813"
},
{
"category": "external",
"summary": "SUSE Bug 1156278 for CVE-2019-18813",
"url": "https://bugzilla.suse.com/1156278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18813"
},
{
"cve": "CVE-2019-19252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19252"
}
],
"notes": [
{
"category": "general",
"text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19252",
"url": "https://www.suse.com/security/cve/CVE-2019-19252"
},
{
"category": "external",
"summary": "SUSE Bug 1157813 for CVE-2019-19252",
"url": "https://bugzilla.suse.com/1157813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19252"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3016"
}
],
"notes": [
{
"category": "general",
"text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3016",
"url": "https://www.suse.com/security/cve/CVE-2019-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1161154 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1161154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3016"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-3887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3887"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3887",
"url": "https://www.suse.com/security/cve/CVE-2019-3887"
},
{
"category": "external",
"summary": "SUSE Bug 1131800 for CVE-2019-3887",
"url": "https://bugzilla.suse.com/1131800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3887"
},
{
"cve": "CVE-2019-6974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6974",
"url": "https://www.suse.com/security/cve/CVE-2019-6974"
},
{
"category": "external",
"summary": "SUSE Bug 1124728 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124728"
},
{
"category": "external",
"summary": "SUSE Bug 1124729 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-6974"
},
{
"cve": "CVE-2019-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7221"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7221",
"url": "https://www.suse.com/security/cve/CVE-2019-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1124732 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124732"
},
{
"category": "external",
"summary": "SUSE Bug 1124734 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-7221"
},
{
"cve": "CVE-2019-7222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7222"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7222",
"url": "https://www.suse.com/security/cve/CVE-2019-7222"
},
{
"category": "external",
"summary": "SUSE Bug 1124735 for CVE-2019-7222",
"url": "https://bugzilla.suse.com/1124735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-7222"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-8912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8912",
"url": "https://www.suse.com/security/cve/CVE-2019-8912"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1126284 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1126284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8912"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-10766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10766"
}
],
"notes": [
{
"category": "general",
"text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10766",
"url": "https://www.suse.com/security/cve/CVE-2020-10766"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1172781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10766"
},
{
"cve": "CVE-2020-10767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10767"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10767",
"url": "https://www.suse.com/security/cve/CVE-2020-10767"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1172782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10767"
},
{
"cve": "CVE-2020-10768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10768"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10768",
"url": "https://www.suse.com/security/cve/CVE-2020-10768"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1172783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-12351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12351"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12351",
"url": "https://www.suse.com/security/cve/CVE-2020-12351"
},
{
"category": "external",
"summary": "SUSE Bug 1177724 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177724"
},
{
"category": "external",
"summary": "SUSE Bug 1177729 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177729"
},
{
"category": "external",
"summary": "SUSE Bug 1178397 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1178397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-12351"
},
{
"cve": "CVE-2020-12352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12352"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12352",
"url": "https://www.suse.com/security/cve/CVE-2020-12352"
},
{
"category": "external",
"summary": "SUSE Bug 1177725 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1177725"
},
{
"category": "external",
"summary": "SUSE Bug 1178398 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1178398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12352"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14386"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14386",
"url": "https://www.suse.com/security/cve/CVE-2020-14386"
},
{
"category": "external",
"summary": "SUSE Bug 1176069 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176069"
},
{
"category": "external",
"summary": "SUSE Bug 1176072 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14386"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25639"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25639",
"url": "https://www.suse.com/security/cve/CVE-2020-25639"
},
{
"category": "external",
"summary": "SUSE Bug 1176846 for CVE-2020-25639",
"url": "https://bugzilla.suse.com/1176846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25639"
},
{
"cve": "CVE-2020-25656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25656",
"url": "https://www.suse.com/security/cve/CVE-2020-25656"
},
{
"category": "external",
"summary": "SUSE Bug 1177766 for CVE-2020-25656",
"url": "https://bugzilla.suse.com/1177766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25656"
},
{
"cve": "CVE-2020-25668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25668",
"url": "https://www.suse.com/security/cve/CVE-2020-25668"
},
{
"category": "external",
"summary": "SUSE Bug 1178123 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178123"
},
{
"category": "external",
"summary": "SUSE Bug 1178622 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178622"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25668"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-2732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2732",
"url": "https://www.suse.com/security/cve/CVE-2020-2732"
},
{
"category": "external",
"summary": "SUSE Bug 1163971 for CVE-2020-2732",
"url": "https://bugzilla.suse.com/1163971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2732"
},
{
"cve": "CVE-2020-29660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29660"
}
],
"notes": [
{
"category": "general",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29660",
"url": "https://www.suse.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29661"
}
],
"notes": [
{
"category": "general",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29661",
"url": "https://www.suse.com/security/cve/CVE-2020-29661"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179877"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2020-8648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8648"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8648",
"url": "https://www.suse.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "SUSE Bug 1162928 for CVE-2020-8648",
"url": "https://bugzilla.suse.com/1162928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8694"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8694",
"url": "https://www.suse.com/security/cve/CVE-2020-8694"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178700 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178700"
},
{
"category": "external",
"summary": "SUSE Bug 1179661 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1179661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-26708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26708"
}
],
"notes": [
{
"category": "general",
"text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26708",
"url": "https://www.suse.com/security/cve/CVE-2021-26708"
},
{
"category": "external",
"summary": "SUSE Bug 1181806 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1181806"
},
{
"category": "external",
"summary": "SUSE Bug 1183298 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1183298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-26708"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-32606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32606",
"url": "https://www.suse.com/security/cve/CVE-2021-32606"
},
{
"category": "external",
"summary": "SUSE Bug 1185953 for CVE-2021-32606",
"url": "https://bugzilla.suse.com/1185953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32606"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-38166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38166"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38166",
"url": "https://www.suse.com/security/cve/CVE-2021-38166"
},
{
"category": "external",
"summary": "SUSE Bug 1189233 for CVE-2021-38166",
"url": "https://bugzilla.suse.com/1189233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-38166"
},
{
"cve": "CVE-2021-43976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43976",
"url": "https://www.suse.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "SUSE Bug 1192847 for CVE-2021-43976",
"url": "https://bugzilla.suse.com/1192847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-43976"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
},
{
"cve": "CVE-2022-0330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0330"
}
],
"notes": [
{
"category": "general",
"text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0330",
"url": "https://www.suse.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "SUSE Bug 1194880 for CVE-2022-0330",
"url": "https://bugzilla.suse.com/1194880"
},
{
"category": "external",
"summary": "SUSE Bug 1195950 for CVE-2022-0330",
"url": "https://bugzilla.suse.com/1195950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0330"
},
{
"cve": "CVE-2022-0847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0847"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0847",
"url": "https://www.suse.com/security/cve/CVE-2022-0847"
},
{
"category": "external",
"summary": "SUSE Bug 1196584 for CVE-2022-0847",
"url": "https://bugzilla.suse.com/1196584"
},
{
"category": "external",
"summary": "SUSE Bug 1196601 for CVE-2022-0847",
"url": "https://bugzilla.suse.com/1196601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0886"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0886",
"url": "https://www.suse.com/security/cve/CVE-2022-0886"
},
{
"category": "external",
"summary": "SUSE Bug 1197131 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197131"
},
{
"category": "external",
"summary": "SUSE Bug 1197133 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197133"
},
{
"category": "external",
"summary": "SUSE Bug 1197462 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0886"
},
{
"cve": "CVE-2022-1462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1462"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1462",
"url": "https://www.suse.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "SUSE Bug 1198829 for CVE-2022-1462",
"url": "https://bugzilla.suse.com/1198829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1852"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1852",
"url": "https://www.suse.com/security/cve/CVE-2022-1852"
},
{
"category": "external",
"summary": "SUSE Bug 1199875 for CVE-2022-1852",
"url": "https://bugzilla.suse.com/1199875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1972"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1972",
"url": "https://www.suse.com/security/cve/CVE-2022-1972"
},
{
"category": "external",
"summary": "SUSE Bug 1200019 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "external",
"summary": "SUSE Bug 1200266 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1972"
},
{
"cve": "CVE-2022-1973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1973"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1973",
"url": "https://www.suse.com/security/cve/CVE-2022-1973"
},
{
"category": "external",
"summary": "SUSE Bug 1200023 for CVE-2022-1973",
"url": "https://bugzilla.suse.com/1200023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1973"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2308"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2308",
"url": "https://www.suse.com/security/cve/CVE-2022-2308"
},
{
"category": "external",
"summary": "SUSE Bug 1202573 for CVE-2022-2308",
"url": "https://bugzilla.suse.com/1202573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2308"
},
{
"cve": "CVE-2022-24958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24958"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24958",
"url": "https://www.suse.com/security/cve/CVE-2022-24958"
},
{
"category": "external",
"summary": "SUSE Bug 1195905 for CVE-2022-24958",
"url": "https://bugzilla.suse.com/1195905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2590"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2590",
"url": "https://www.suse.com/security/cve/CVE-2022-2590"
},
{
"category": "external",
"summary": "SUSE Bug 1202013 for CVE-2022-2590",
"url": "https://bugzilla.suse.com/1202013"
},
{
"category": "external",
"summary": "SUSE Bug 1202089 for CVE-2022-2590",
"url": "https://bugzilla.suse.com/1202089"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2590"
},
{
"cve": "CVE-2022-26490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26490"
}
],
"notes": [
{
"category": "general",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26490",
"url": "https://www.suse.com/security/cve/CVE-2022-26490"
},
{
"category": "external",
"summary": "SUSE Bug 1196830 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "external",
"summary": "SUSE Bug 1201656 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201656"
},
{
"category": "external",
"summary": "SUSE Bug 1201969 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201969"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-28388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28388"
}
],
"notes": [
{
"category": "general",
"text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28388",
"url": "https://www.suse.com/security/cve/CVE-2022-28388"
},
{
"category": "external",
"summary": "SUSE Bug 1198032 for CVE-2022-28388",
"url": "https://bugzilla.suse.com/1198032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28388"
},
{
"cve": "CVE-2022-28389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28389"
}
],
"notes": [
{
"category": "general",
"text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28389",
"url": "https://www.suse.com/security/cve/CVE-2022-28389"
},
{
"category": "external",
"summary": "SUSE Bug 1198033 for CVE-2022-28389",
"url": "https://bugzilla.suse.com/1198033"
},
{
"category": "external",
"summary": "SUSE Bug 1201657 for CVE-2022-28389",
"url": "https://bugzilla.suse.com/1201657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-28389"
},
{
"cve": "CVE-2022-28390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28390"
}
],
"notes": [
{
"category": "general",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28390",
"url": "https://www.suse.com/security/cve/CVE-2022-28390"
},
{
"category": "external",
"summary": "SUSE Bug 1198031 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1198031"
},
{
"category": "external",
"summary": "SUSE Bug 1201517 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1201517"
},
{
"category": "external",
"summary": "SUSE Bug 1207969 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1207969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-28893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28893"
}
],
"notes": [
{
"category": "general",
"text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28893",
"url": "https://www.suse.com/security/cve/CVE-2022-28893"
},
{
"category": "external",
"summary": "SUSE Bug 1198330 for CVE-2022-28893",
"url": "https://bugzilla.suse.com/1198330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28893"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-29968",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29968"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29968",
"url": "https://www.suse.com/security/cve/CVE-2022-29968"
},
{
"category": "external",
"summary": "SUSE Bug 1199087 for CVE-2022-29968",
"url": "https://bugzilla.suse.com/1199087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-29968"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40982"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40982",
"url": "https://www.suse.com/security/cve/CVE-2022-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1206418 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-4379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4379",
"url": "https://www.suse.com/security/cve/CVE-2022-4379"
},
{
"category": "external",
"summary": "SUSE Bug 1206209 for CVE-2022-4379",
"url": "https://bugzilla.suse.com/1206209"
},
{
"category": "external",
"summary": "SUSE Bug 1206373 for CVE-2022-4379",
"url": "https://bugzilla.suse.com/1206373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-4379"
},
{
"cve": "CVE-2022-44032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44032"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44032",
"url": "https://www.suse.com/security/cve/CVE-2022-44032"
},
{
"category": "external",
"summary": "SUSE Bug 1204894 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1204894"
},
{
"category": "external",
"summary": "SUSE Bug 1212290 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1212290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44032"
},
{
"cve": "CVE-2022-44033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44033"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44033",
"url": "https://www.suse.com/security/cve/CVE-2022-44033"
},
{
"category": "external",
"summary": "SUSE Bug 1204922 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1204922"
},
{
"category": "external",
"summary": "SUSE Bug 1212306 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1212306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44033"
},
{
"cve": "CVE-2022-44034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44034"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44034",
"url": "https://www.suse.com/security/cve/CVE-2022-44034"
},
{
"category": "external",
"summary": "SUSE Bug 1204901 for CVE-2022-44034",
"url": "https://bugzilla.suse.com/1204901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44034"
},
{
"cve": "CVE-2022-45884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45884"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45884",
"url": "https://www.suse.com/security/cve/CVE-2022-45884"
},
{
"category": "external",
"summary": "SUSE Bug 1205756 for CVE-2022-45884",
"url": "https://bugzilla.suse.com/1205756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45885"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45885",
"url": "https://www.suse.com/security/cve/CVE-2022-45885"
},
{
"category": "external",
"summary": "SUSE Bug 1205758 for CVE-2022-45885",
"url": "https://bugzilla.suse.com/1205758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45886"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45886",
"url": "https://www.suse.com/security/cve/CVE-2022-45886"
},
{
"category": "external",
"summary": "SUSE Bug 1205760 for CVE-2022-45886",
"url": "https://bugzilla.suse.com/1205760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45887"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45887",
"url": "https://www.suse.com/security/cve/CVE-2022-45887"
},
{
"category": "external",
"summary": "SUSE Bug 1205762 for CVE-2022-45887",
"url": "https://bugzilla.suse.com/1205762"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2022-45887",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45919"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45919",
"url": "https://www.suse.com/security/cve/CVE-2022-45919"
},
{
"category": "external",
"summary": "SUSE Bug 1205803 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1205803"
},
{
"category": "external",
"summary": "SUSE Bug 1208600 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208600"
},
{
"category": "external",
"summary": "SUSE Bug 1208912 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208912"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2023-0045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0045"
}
],
"notes": [
{
"category": "general",
"text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0045",
"url": "https://www.suse.com/security/cve/CVE-2023-0045"
},
{
"category": "external",
"summary": "SUSE Bug 1207773 for CVE-2023-0045",
"url": "https://bugzilla.suse.com/1207773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-1076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1076"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1076",
"url": "https://www.suse.com/security/cve/CVE-2023-1076"
},
{
"category": "external",
"summary": "SUSE Bug 1208599 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1208599"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1078"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1078",
"url": "https://www.suse.com/security/cve/CVE-2023-1078"
},
{
"category": "external",
"summary": "SUSE Bug 1208601 for CVE-2023-1078",
"url": "https://bugzilla.suse.com/1208601"
},
{
"category": "external",
"summary": "SUSE Bug 1208603 for CVE-2023-1078",
"url": "https://bugzilla.suse.com/1208603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-1078"
},
{
"cve": "CVE-2023-1192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1192"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1192",
"url": "https://www.suse.com/security/cve/CVE-2023-1192"
},
{
"category": "external",
"summary": "SUSE Bug 1208995 for CVE-2023-1192",
"url": "https://bugzilla.suse.com/1208995"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1192"
},
{
"cve": "CVE-2023-1380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1380"
}
],
"notes": [
{
"category": "general",
"text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1380",
"url": "https://www.suse.com/security/cve/CVE-2023-1380"
},
{
"category": "external",
"summary": "SUSE Bug 1209287 for CVE-2023-1380",
"url": "https://bugzilla.suse.com/1209287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-31084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-31084"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-31084",
"url": "https://www.suse.com/security/cve/CVE-2023-31084"
},
{
"category": "external",
"summary": "SUSE Bug 1210783 for CVE-2023-31084",
"url": "https://bugzilla.suse.com/1210783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3141"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3141",
"url": "https://www.suse.com/security/cve/CVE-2023-3141"
},
{
"category": "external",
"summary": "SUSE Bug 1212129 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1212129"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3269"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3269",
"url": "https://www.suse.com/security/cve/CVE-2023-3269"
},
{
"category": "external",
"summary": "SUSE Bug 1212395 for CVE-2023-3269",
"url": "https://bugzilla.suse.com/1212395"
},
{
"category": "external",
"summary": "SUSE Bug 1213760 for CVE-2023-3269",
"url": "https://bugzilla.suse.com/1213760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-3269"
},
{
"cve": "CVE-2023-39192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39192"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39192",
"url": "https://www.suse.com/security/cve/CVE-2023-39192"
},
{
"category": "external",
"summary": "SUSE Bug 1215858 for CVE-2023-39192",
"url": "https://bugzilla.suse.com/1215858"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39192",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39193"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39193",
"url": "https://www.suse.com/security/cve/CVE-2023-39193"
},
{
"category": "external",
"summary": "SUSE Bug 1215860 for CVE-2023-39193",
"url": "https://bugzilla.suse.com/1215860"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39193",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-4128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4128"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4128",
"url": "https://www.suse.com/security/cve/CVE-2023-4128"
},
{
"category": "external",
"summary": "SUSE Bug 1214149 for CVE-2023-4128",
"url": "https://bugzilla.suse.com/1214149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4128"
},
{
"cve": "CVE-2023-4134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4134"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4134",
"url": "https://www.suse.com/security/cve/CVE-2023-4134"
},
{
"category": "external",
"summary": "SUSE Bug 1213971 for CVE-2023-4134",
"url": "https://bugzilla.suse.com/1213971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4134"
},
{
"cve": "CVE-2023-4194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4194"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4194",
"url": "https://www.suse.com/security/cve/CVE-2023-4194"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-4194",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4194"
},
{
"cve": "CVE-2023-42753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42753"
}
],
"notes": [
{
"category": "general",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42753",
"url": "https://www.suse.com/security/cve/CVE-2023-42753"
},
{
"category": "external",
"summary": "SUSE Bug 1215150 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1215150"
},
{
"category": "external",
"summary": "SUSE Bug 1218613 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1218613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42754"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42754",
"url": "https://www.suse.com/security/cve/CVE-2023-42754"
},
{
"category": "external",
"summary": "SUSE Bug 1215467 for CVE-2023-42754",
"url": "https://bugzilla.suse.com/1215467"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-42754",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42756"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42756",
"url": "https://www.suse.com/security/cve/CVE-2023-42756"
},
{
"category": "external",
"summary": "SUSE Bug 1215767 for CVE-2023-42756",
"url": "https://bugzilla.suse.com/1215767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42756"
},
{
"cve": "CVE-2023-4623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4623"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4623",
"url": "https://www.suse.com/security/cve/CVE-2023-4623"
},
{
"category": "external",
"summary": "SUSE Bug 1215115 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1215115"
},
{
"category": "external",
"summary": "SUSE Bug 1215440 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1215440"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1219698 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1219698"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1221598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-46813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46813"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46813",
"url": "https://www.suse.com/security/cve/CVE-2023-46813"
},
{
"category": "external",
"summary": "SUSE Bug 1212649 for CVE-2023-46813",
"url": "https://bugzilla.suse.com/1212649"
},
{
"category": "external",
"summary": "SUSE Bug 1216896 for CVE-2023-46813",
"url": "https://bugzilla.suse.com/1216896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-46813"
},
{
"cve": "CVE-2023-4881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4881"
}
],
"notes": [
{
"category": "general",
"text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4881",
"url": "https://www.suse.com/security/cve/CVE-2023-4881"
},
{
"category": "external",
"summary": "SUSE Bug 1215221 for CVE-2023-4881",
"url": "https://bugzilla.suse.com/1215221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4881"
},
{
"cve": "CVE-2023-5345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5345"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5345",
"url": "https://www.suse.com/security/cve/CVE-2023-5345"
},
{
"category": "external",
"summary": "SUSE Bug 1215899 for CVE-2023-5345",
"url": "https://bugzilla.suse.com/1215899"
},
{
"category": "external",
"summary": "SUSE Bug 1215971 for CVE-2023-5345",
"url": "https://bugzilla.suse.com/1215971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-5345"
},
{
"cve": "CVE-2023-6606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6606"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6606",
"url": "https://www.suse.com/security/cve/CVE-2023-6606"
},
{
"category": "external",
"summary": "SUSE Bug 1217947 for CVE-2023-6606",
"url": "https://bugzilla.suse.com/1217947"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-6606",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6610"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6610",
"url": "https://www.suse.com/security/cve/CVE-2023-6610"
},
{
"category": "external",
"summary": "SUSE Bug 1217946 for CVE-2023-6610",
"url": "https://bugzilla.suse.com/1217946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6610"
}
]
}
opensuse-su-2021:2409-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2409",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2409-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2409-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2409-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:53Z",
"generator": {
"date": "2021-07-20T12:40:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2409-1",
"initial_release_date": "2021-07-20T12:40:53Z",
"revision_history": [
{
"date": "2021-07-20T12:40:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.14.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
opensuse-su-2021:2427-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)\n\nThe following non-security bugs were fixed:\n\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- x86/crash: Add e820 reserved ranges to kdump kernel\u0027s e820 table (bsc#1181193).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).\n- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2427-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2427-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2427-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1181193",
"url": "https://bugzilla.suse.com/1181193"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:28:39Z",
"generator": {
"date": "2021-07-21T09:28:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2427-1",
"initial_release_date": "2021-07-21T09:28:39Z",
"revision_history": [
{
"date": "2021-07-21T09:28:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-3609"
}
]
}
rhsa-2021:2715
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z2 source tree (BZ#1975405)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2715",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2715.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:37+00:00",
"generator": {
"date": "2025-10-09T20:53:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2715",
"initial_release_date": "2021-07-20T20:59:11+00:00",
"revision_history": [
{
"date": "2021-07-20T20:59:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:59:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2722
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2722",
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2722.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:46+00:00",
"generator": {
"date": "2025-10-09T22:08:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2722",
"initial_release_date": "2021-07-20T21:28:25+00:00",
"revision_history": [
{
"date": "2021-07-20T21:28:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:28:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.51.2.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.51.2.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:28:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2735
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2735",
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1930246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2735.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:00:45+00:00",
"generator": {
"date": "2025-10-09T20:00:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2735",
"initial_release_date": "2021-07-20T21:02:15+00:00",
"revision_history": [
{
"date": "2021-07-20T21:02:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:02:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:00:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.src",
"product_id": "kernel-0:2.6.32-754.41.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.i686",
"product_id": "perf-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x",
"product_id": "perf-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.41.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.41.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.41.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12362",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12362"
},
{
"category": "external",
"summary": "RHBZ#1930246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2733
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2733",
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2733.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:22+00:00",
"generator": {
"date": "2024-11-15T11:53:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2733",
"initial_release_date": "2021-07-20T20:23:57+00:00",
"revision_history": [
{
"date": "2021-07-20T20:23:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:23:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.90.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.90.2.el7.src",
"product_id": "kernel-0:3.10.0-514.90.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.90.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.90.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.90.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2718
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.2 Snapshot2 - tpm: ibmvtpm: Wait for buffer to be set before proceeding (BZ#1933986)\n\n* fnic crash from invalid request pointer (BZ#1961707)\n\n* [Azure][RHEL8.4] Two Patches Needed To Enable Azure Host Time-syncing in VMs (BZ#1963051)\n\n* RHEL kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1969338)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2718",
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2718.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:25:11+00:00",
"generator": {
"date": "2025-10-09T20:25:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2718",
"initial_release_date": "2021-07-20T22:23:01+00:00",
"revision_history": [
{
"date": "2021-07-20T22:23:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:23:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:25:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.60.2.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.60.2.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-11-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1895961"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf_event_parse_addr_filter memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25704"
},
{
"category": "external",
"summary": "RHBZ#1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/09/1"
}
],
"release_date": "2020-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: perf_event_parse_addr_filter memory"
},
{
"cve": "CVE-2020-26541",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "RHBZ#1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c"
},
{
"acknowledgments": [
{
"names": [
"Eddy Wu"
],
"organization": "trendmicro.com"
}
],
"cve": "CVE-2020-35508",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2020-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35508"
},
{
"category": "external",
"summary": "RHBZ#1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508"
}
],
"release_date": "2020-12-09T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2728
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2728",
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2728.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:35+00:00",
"generator": {
"date": "2024-11-15T11:53:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2728",
"initial_release_date": "2021-07-21T02:21:11+00:00",
"revision_history": [
{
"date": "2021-07-21T02:21:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T02:21:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.52.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.52.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"known_not_affected": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T02:21:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"known_not_affected": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T02:21:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2729
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2729",
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2729.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2729",
"initial_release_date": "2021-07-21T00:47:07+00:00",
"revision_history": [
{
"date": "2021-07-21T00:47:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:47:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:47:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:47:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2737
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2737",
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2737.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.17",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2737",
"initial_release_date": "2021-07-21T14:11:16+00:00",
"revision_history": [
{
"date": "2021-07-21T14:11:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T14:11:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.17-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.17-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.17-20210713.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.17-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.17-20210713.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T14:11:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T14:11:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2719
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z10 Batch source tree (BZ#1968022)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2719",
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1968022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968022"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2719.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:25:11+00:00",
"generator": {
"date": "2025-10-09T20:25:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2719",
"initial_release_date": "2021-07-20T21:30:38+00:00",
"revision_history": [
{
"date": "2021-07-20T21:30:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:30:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:25:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.60.2.rt13.112.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1895961"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf_event_parse_addr_filter memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25704"
},
{
"category": "external",
"summary": "RHBZ#1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/09/1"
}
],
"release_date": "2020-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: perf_event_parse_addr_filter memory"
},
{
"cve": "CVE-2020-26541",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "RHBZ#1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c"
},
{
"acknowledgments": [
{
"names": [
"Eddy Wu"
],
"organization": "trendmicro.com"
}
],
"cve": "CVE-2020-35508",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2020-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35508"
},
{
"category": "external",
"summary": "RHBZ#1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508"
}
],
"release_date": "2020-12-09T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2720
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2720",
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2720.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:46+00:00",
"generator": {
"date": "2025-10-09T22:08:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2720",
"initial_release_date": "2021-07-21T00:20:41+00:00",
"revision_history": [
{
"date": "2021-07-21T00:20:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:20:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:20:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:20:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2727
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2727",
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2727.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2727",
"initial_release_date": "2021-07-20T22:48:17+00:00",
"revision_history": [
{
"date": "2021-07-20T22:48:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:48:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:48:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:48:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2714
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* pinctrl_emmitsburg: improper configuration (BZ#1963984)\n\n* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)\n\n* RHEL8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/RHEL8.4) (BZ#1964697)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)\n\n* backport fixes for Connection Tracking offload (BZ#1968679)\n\n* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)\n\n* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)\n\n* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)\n\n* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)\n\n* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)\n\n* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)\n\n* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)\n\n* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)\n\n* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)\n\n* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)\n\n* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)\n\n* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)\n\n* Backport netlink extack tracepoint (BZ#1972938)\n\n* [RHEL8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2714",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2714.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:36+00:00",
"generator": {
"date": "2025-10-09T20:53:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2714",
"initial_release_date": "2021-07-20T22:47:03+00:00",
"revision_history": [
{
"date": "2021-07-20T22:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:47:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2734
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* xfs umount hangs in xfs_wait_buftarg() due to negative bt_io_count (BZ#1949916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2734",
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2734.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2734",
"initial_release_date": "2021-07-20T20:06:55+00:00",
"revision_history": [
{
"date": "2021-07-20T20:06:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:06:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.98.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.98.2.el7.src",
"product_id": "kernel-0:3.10.0-327.98.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.98.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.98.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.98.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:06:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:06:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2728
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2728",
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2728.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2728",
"initial_release_date": "2021-07-21T02:21:11+00:00",
"revision_history": [
{
"date": "2021-07-21T02:21:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T02:21:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.52.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.52.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"known_not_affected": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T02:21:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"known_not_affected": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T02:21:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2722
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2722",
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2722.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:46+00:00",
"generator": {
"date": "2025-10-09T22:08:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2722",
"initial_release_date": "2021-07-20T21:28:25+00:00",
"revision_history": [
{
"date": "2021-07-20T21:28:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:28:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.51.2.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.51.2.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:28:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2726
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z7 source tree (BZ#1967333)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2726",
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2726.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:32:44+00:00",
"generator": {
"date": "2025-10-09T19:32:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2726",
"initial_release_date": "2021-07-21T01:08:44+00:00",
"revision_history": [
{
"date": "2021-07-21T01:08:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T01:08:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:32:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.36.2.rt56.1179.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.36.2.rt56.1179.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20934",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in show_numa_stats function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20934"
},
{
"category": "external",
"summary": "RHBZ#1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
}
],
"release_date": "2020-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in show_numa_stats function"
},
{
"cve": "CVE-2020-11668",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1824792"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11668"
},
{
"category": "external",
"summary": "RHBZ#1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
}
],
"release_date": "2020-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2715
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z2 source tree (BZ#1975405)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2715",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2715.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:37+00:00",
"generator": {
"date": "2025-10-09T20:53:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2715",
"initial_release_date": "2021-07-20T20:59:11+00:00",
"revision_history": [
{
"date": "2021-07-20T20:59:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:59:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2728
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2728",
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2728.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2728",
"initial_release_date": "2021-07-21T02:21:11+00:00",
"revision_history": [
{
"date": "2021-07-21T02:21:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T02:21:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.52.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.52.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.52.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "perf-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.52.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"known_not_affected": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T02:21:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"known_not_affected": [
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T02:21:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.src",
"7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.52.2.el7.noarch",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.52.2.el7.x86_64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.ppc64le",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.s390x",
"7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.52.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [RHEL7.9.z] n_tty_open: \"BUG: unable to handle kernel paging request\" (BZ#1872778)\n\n* [ESXi][RHEL7.8]\"qp_alloc_hypercall result = -20\" / \"Could not attach to queue pair with -20\" with vSphere Fault Tolerance enabled (BZ#1892237)\n\n* [RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP (BZ#1910395)\n\n* False-positive hard lockup detected while processing the thread state information (SysRq-T) (BZ#1912221)\n\n* RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) (BZ#1917943)\n\n* The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console (BZ#1924688)\n\n* nvme hangs when trying to allocate reserved tag (BZ#1926825)\n\n* [REGRESSION] \"call into AER handling regardless of severity\" triggers do_recovery() unnecessarily on correctable PCIe errors (BZ#1933663)\n\n* Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793)\n\n* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! (BZ#1953052)\n\n* [Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed (BZ#1953075)\n\n* Kernel panic at cgroup_is_descendant (BZ#1957719)\n\n* [Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803)\n\n* IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1960193)\n\n* mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406)\n\n* incorrect assertion on pi_state-\u003epi_mutex.wait_lock from pi_state_update_owner() (BZ#1965495)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2725",
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:53:19+00:00",
"generator": {
"date": "2024-11-15T11:53:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2725",
"initial_release_date": "2021-07-21T01:17:48+00:00",
"revision_history": [
{
"date": "2021-07-21T01:17:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T01:17:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.36.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.36.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20934",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in show_numa_stats function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20934"
},
{
"category": "external",
"summary": "RHBZ#1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
}
],
"release_date": "2020-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in show_numa_stats function"
},
{
"cve": "CVE-2020-11668",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1824792"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11668"
},
{
"category": "external",
"summary": "RHBZ#1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
}
],
"release_date": "2020-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2731
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2731",
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2731.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2731",
"initial_release_date": "2021-07-21T00:09:55+00:00",
"revision_history": [
{
"date": "2021-07-21T00:09:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:09:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [RHEL7.9.z] n_tty_open: \"BUG: unable to handle kernel paging request\" (BZ#1872778)\n\n* [ESXi][RHEL7.8]\"qp_alloc_hypercall result = -20\" / \"Could not attach to queue pair with -20\" with vSphere Fault Tolerance enabled (BZ#1892237)\n\n* [RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP (BZ#1910395)\n\n* False-positive hard lockup detected while processing the thread state information (SysRq-T) (BZ#1912221)\n\n* RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) (BZ#1917943)\n\n* The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console (BZ#1924688)\n\n* nvme hangs when trying to allocate reserved tag (BZ#1926825)\n\n* [REGRESSION] \"call into AER handling regardless of severity\" triggers do_recovery() unnecessarily on correctable PCIe errors (BZ#1933663)\n\n* Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793)\n\n* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! (BZ#1953052)\n\n* [Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed (BZ#1953075)\n\n* Kernel panic at cgroup_is_descendant (BZ#1957719)\n\n* [Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803)\n\n* IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1960193)\n\n* mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406)\n\n* incorrect assertion on pi_state-\u003epi_mutex.wait_lock from pi_state_update_owner() (BZ#1965495)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2725",
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:32:44+00:00",
"generator": {
"date": "2025-10-09T19:32:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2725",
"initial_release_date": "2021-07-21T01:17:48+00:00",
"revision_history": [
{
"date": "2021-07-21T01:17:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T01:17:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:32:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.36.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.36.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20934",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in show_numa_stats function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20934"
},
{
"category": "external",
"summary": "RHBZ#1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
}
],
"release_date": "2020-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in show_numa_stats function"
},
{
"cve": "CVE-2020-11668",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1824792"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11668"
},
{
"category": "external",
"summary": "RHBZ#1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
}
],
"release_date": "2020-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2729
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2729",
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2729.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:42+00:00",
"generator": {
"date": "2024-11-15T11:53:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2729",
"initial_release_date": "2021-07-21T00:47:07+00:00",
"revision_history": [
{
"date": "2021-07-21T00:47:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:47:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:47:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:47:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2727
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2727",
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2727.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:15+00:00",
"generator": {
"date": "2024-11-15T11:53:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2727",
"initial_release_date": "2021-07-20T22:48:17+00:00",
"revision_history": [
{
"date": "2021-07-20T22:48:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:48:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:48:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:48:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2723
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2723",
"url": "https://access.redhat.com/errata/RHSA-2021:2723"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2723.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:52:52+00:00",
"generator": {
"date": "2024-11-15T11:52:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2723",
"initial_release_date": "2021-07-20T22:28:07+00:00",
"revision_history": [
{
"date": "2021-07-20T22:28:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:28:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:28:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2723"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2718
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.2 Snapshot2 - tpm: ibmvtpm: Wait for buffer to be set before proceeding (BZ#1933986)\n\n* fnic crash from invalid request pointer (BZ#1961707)\n\n* [Azure][RHEL8.4] Two Patches Needed To Enable Azure Host Time-syncing in VMs (BZ#1963051)\n\n* RHEL kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1969338)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2718",
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2718.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:16+00:00",
"generator": {
"date": "2024-11-15T11:52:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2718",
"initial_release_date": "2021-07-20T22:23:01+00:00",
"revision_history": [
{
"date": "2021-07-20T22:23:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:23:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.60.2.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.60.2.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-11-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1895961"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf_event_parse_addr_filter memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25704"
},
{
"category": "external",
"summary": "RHBZ#1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/09/1"
}
],
"release_date": "2020-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: perf_event_parse_addr_filter memory"
},
{
"cve": "CVE-2020-26541",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "RHBZ#1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c"
},
{
"acknowledgments": [
{
"names": [
"Eddy Wu"
],
"organization": "trendmicro.com"
}
],
"cve": "CVE-2020-35508",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2020-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35508"
},
{
"category": "external",
"summary": "RHBZ#1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508"
}
],
"release_date": "2020-12-09T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2716
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2716",
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2716.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:33+00:00",
"generator": {
"date": "2025-10-09T20:53:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2716",
"initial_release_date": "2021-07-21T00:24:39+00:00",
"revision_history": [
{
"date": "2021-07-21T00:24:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:24:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2734
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* xfs umount hangs in xfs_wait_buftarg() due to negative bt_io_count (BZ#1949916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2734",
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2734.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2734",
"initial_release_date": "2021-07-20T20:06:55+00:00",
"revision_history": [
{
"date": "2021-07-20T20:06:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:06:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.98.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.98.2.el7.src",
"product_id": "kernel-0:3.10.0-327.98.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.98.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.98.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.98.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:06:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:06:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2735
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2735",
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1930246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2735.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:00:45+00:00",
"generator": {
"date": "2025-10-09T20:00:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2735",
"initial_release_date": "2021-07-20T21:02:15+00:00",
"revision_history": [
{
"date": "2021-07-20T21:02:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:02:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:00:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.src",
"product_id": "kernel-0:2.6.32-754.41.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.i686",
"product_id": "perf-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x",
"product_id": "perf-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.41.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.41.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.41.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12362",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12362"
},
{
"category": "external",
"summary": "RHBZ#1930246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2737
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2737",
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2737.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.17",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2737",
"initial_release_date": "2021-07-21T14:11:16+00:00",
"revision_history": [
{
"date": "2021-07-21T14:11:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T14:11:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.17-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.17-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.17-20210713.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.17-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.17-20210713.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T14:11:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T14:11:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2736
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* ansible: multiple modules expose secured values (CVE-2021-3447)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The redhat-release-virtualization-host package no longer requires vdsm-hooks. In this release, the installation of vdsm-hooks is not mandatory for the Red Hat Virtualization Host. (BZ#1976095)\n\n* Previously, rhsmcertd was not enabled by default on the Red Hat Virtualization Host. As a result, the systems did not regularly report to RHSM while the subscription-manager reported no obvious issues and repositories were properly enabled.\nIn this release, rhsmcertd is enabled by default in RHVH, and as a result, RHSM now receives reports regularly. (BZ#1958145)\n\n* In this release, the Red Hat Virtualization Host has been rebased on top of the RHEL 8.4.0 Batch #1 update. For more information, see the RHEL release notes. (BZ#1957242)\n\n* Red Hat Virtualization Host now includes an updated scap-security-guide-rhv which allows you to apply a PCI DSS security profile to the system during installation, (BZ#1883793)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2736",
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1883793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883793"
},
{
"category": "external",
"summary": "1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "1955415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955415"
},
{
"category": "external",
"summary": "1957242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957242"
},
{
"category": "external",
"summary": "1958145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958145"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "1970970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970970"
},
{
"category": "external",
"summary": "1976005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976005"
},
{
"category": "external",
"summary": "1976095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976095"
},
{
"category": "external",
"summary": "1976118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976118"
},
{
"category": "external",
"summary": "1976146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976146"
},
{
"category": "external",
"summary": "1976148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976148"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2736.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2024-11-22T16:59:58+00:00",
"generator": {
"date": "2024-11-22T16:59:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2736",
"initial_release_date": "2021-07-22T15:09:21+00:00",
"revision_history": [
{
"date": "2021-07-22T15:09:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-22T15:09:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:59:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_id": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.54-2.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product_id": "imgbased-0:1.2.21-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.src",
"product": {
"name": "vhostmd-0:1.1-5.el8.src",
"product_id": "vhostmd-0:1.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.54-2.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-3.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210715.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debugsource@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debuginfo@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-devel@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debugsource@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debuginfo@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-debuginfo@1.1-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src"
},
"product_reference": "vhostmd-0:1.1-5.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.54-2.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"John Barker"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Felix Fontein"
]
},
{
"names": [
"Chen Zhi"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3447",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2021-03-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1939349"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: multiple modules expose secured values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Gluster Storage 3 no longer maintains its own version of ansible, prerequisite is to enable ansible repository in order to consume the latest version of ansible which has many bug and security fixes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "RHBZ#1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447"
}
],
"release_date": "2021-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: multiple modules expose secured values"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33910",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack. The highest threat from this vulnerability is to the system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not use strdupa to duplicate strings in unit_name_path_escape function, but strdup, which allocates space on the heap.\n\nFurther, any Red Hat product which is supported on the Red Hat Enterprise Linux platform is also potentially impacted. This includes:\n* Product containers which are based on the RHEL or UBI container images. These images are updated regularly, and container health indicating whether a fix to this flaw is available can be seen in the Container Health Index, part of the Red Hat Container Catalog (https://access.redhat.com/containers). In addition, any customer containers should be manually rebuilt when the base images are updated.\n* Products which pull packages from the RHEL channel. Please ensure that the underlying Red Hat Enterprise Linux systemd package is current in these product environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "RHBZ#1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash"
}
]
}
RHSA-2021:2718
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.2 Snapshot2 - tpm: ibmvtpm: Wait for buffer to be set before proceeding (BZ#1933986)\n\n* fnic crash from invalid request pointer (BZ#1961707)\n\n* [Azure][RHEL8.4] Two Patches Needed To Enable Azure Host Time-syncing in VMs (BZ#1963051)\n\n* RHEL kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1969338)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2718",
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2718.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:25:11+00:00",
"generator": {
"date": "2025-10-09T20:25:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2718",
"initial_release_date": "2021-07-20T22:23:01+00:00",
"revision_history": [
{
"date": "2021-07-20T22:23:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:23:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:25:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.60.2.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.60.2.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product_id": "kernel-0:4.18.0-193.60.2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.60.2.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.60.2.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.60.2.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-11-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1895961"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf_event_parse_addr_filter memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25704"
},
{
"category": "external",
"summary": "RHBZ#1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/09/1"
}
],
"release_date": "2020-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: perf_event_parse_addr_filter memory"
},
{
"cve": "CVE-2020-26541",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "RHBZ#1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c"
},
{
"acknowledgments": [
{
"names": [
"Eddy Wu"
],
"organization": "trendmicro.com"
}
],
"cve": "CVE-2020-35508",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2020-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35508"
},
{
"category": "external",
"summary": "RHBZ#1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508"
}
],
"release_date": "2020-12-09T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:23:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.60.2.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.60.2.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.60.2.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2727
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2727",
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2727.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2727",
"initial_release_date": "2021-07-20T22:48:17+00:00",
"revision_history": [
{
"date": "2021-07-20T22:48:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:48:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-6.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-6.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:48:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:48:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2727"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-6.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2719
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z10 Batch source tree (BZ#1968022)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2719",
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1968022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968022"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2719.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:23+00:00",
"generator": {
"date": "2024-11-15T11:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2719",
"initial_release_date": "2021-07-20T21:30:38+00:00",
"revision_history": [
{
"date": "2021-07-20T21:30:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:30:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.60.2.rt13.112.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1895961"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf_event_parse_addr_filter memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25704"
},
{
"category": "external",
"summary": "RHBZ#1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/09/1"
}
],
"release_date": "2020-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: perf_event_parse_addr_filter memory"
},
{
"cve": "CVE-2020-26541",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "RHBZ#1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c"
},
{
"acknowledgments": [
{
"names": [
"Eddy Wu"
],
"organization": "trendmicro.com"
}
],
"cve": "CVE-2020-35508",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2020-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35508"
},
{
"category": "external",
"summary": "RHBZ#1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508"
}
],
"release_date": "2020-12-09T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2732
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2732",
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1899804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2732.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:01+00:00",
"generator": {
"date": "2024-11-15T11:53:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2732",
"initial_release_date": "2021-07-20T21:27:43+00:00",
"revision_history": [
{
"date": "2021-07-20T21:27:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:27:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.src",
"product_id": "kernel-0:3.10.0-693.90.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.90.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.90.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28374",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2020-11-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1899804"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SCSI target (LIO) write to any block on ILO backstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28374"
},
{
"category": "external",
"summary": "RHBZ#1899804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374"
}
],
"release_date": "2021-01-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: SCSI target (LIO) write to any block on ILO backstore"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2723
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2723",
"url": "https://access.redhat.com/errata/RHSA-2021:2723"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2723.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:46+00:00",
"generator": {
"date": "2025-10-09T22:08:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2723",
"initial_release_date": "2021-07-20T22:28:07+00:00",
"revision_history": [
{
"date": "2021-07-20T22:28:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:28:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:28:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2723"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2731
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2731",
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2731.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2731",
"initial_release_date": "2021-07-21T00:09:55+00:00",
"revision_history": [
{
"date": "2021-07-21T00:09:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:09:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2726
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z7 source tree (BZ#1967333)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2726",
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2726.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:53:13+00:00",
"generator": {
"date": "2024-11-15T11:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2726",
"initial_release_date": "2021-07-21T01:08:44+00:00",
"revision_history": [
{
"date": "2021-07-21T01:08:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T01:08:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.36.2.rt56.1179.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.36.2.rt56.1179.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20934",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in show_numa_stats function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20934"
},
{
"category": "external",
"summary": "RHBZ#1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
}
],
"release_date": "2020-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in show_numa_stats function"
},
{
"cve": "CVE-2020-11668",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1824792"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11668"
},
{
"category": "external",
"summary": "RHBZ#1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
}
],
"release_date": "2020-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2714
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* pinctrl_emmitsburg: improper configuration (BZ#1963984)\n\n* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)\n\n* RHEL8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/RHEL8.4) (BZ#1964697)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)\n\n* backport fixes for Connection Tracking offload (BZ#1968679)\n\n* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)\n\n* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)\n\n* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)\n\n* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)\n\n* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)\n\n* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)\n\n* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)\n\n* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)\n\n* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)\n\n* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)\n\n* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)\n\n* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)\n\n* Backport netlink extack tracepoint (BZ#1972938)\n\n* [RHEL8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2714",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2714.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:36+00:00",
"generator": {
"date": "2025-10-09T20:53:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2714",
"initial_release_date": "2021-07-20T22:47:03+00:00",
"revision_history": [
{
"date": "2021-07-20T22:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:47:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2723
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2723",
"url": "https://access.redhat.com/errata/RHSA-2021:2723"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2723.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:46+00:00",
"generator": {
"date": "2025-10-09T22:08:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2723",
"initial_release_date": "2021-07-20T22:28:07+00:00",
"revision_history": [
{
"date": "2021-07-20T22:28:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:28:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-11.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-8.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-5.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-11.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-8.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-5.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:28:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2723"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-11.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-8.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2720
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2720",
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2720.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:06+00:00",
"generator": {
"date": "2024-11-15T11:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2720",
"initial_release_date": "2021-07-21T00:20:41+00:00",
"revision_history": [
{
"date": "2021-07-21T00:20:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:20:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:20:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:20:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2719
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z10 Batch source tree (BZ#1968022)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2719",
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1968022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968022"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2719.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:25:11+00:00",
"generator": {
"date": "2025-10-09T20:25:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2719",
"initial_release_date": "2021-07-20T21:30:38+00:00",
"revision_history": [
{
"date": "2021-07-20T21:30:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:30:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:25:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.60.2.rt13.112.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.60.2.rt13.112.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25704",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1895961"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf_event_parse_addr_filter memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25704"
},
{
"category": "external",
"summary": "RHBZ#1895961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/11/09/1"
}
],
"release_date": "2020-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: perf_event_parse_addr_filter memory"
},
{
"cve": "CVE-2020-26541",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1886285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "RHBZ#1886285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security bypass in certs/blacklist.c and certs/system_keyring.c"
},
{
"acknowledgments": [
{
"names": [
"Eddy Wu"
],
"organization": "trendmicro.com"
}
],
"cve": "CVE-2020-35508",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2020-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-35508"
},
{
"category": "external",
"summary": "RHBZ#1902724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508"
}
],
"release_date": "2020-12-09T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:30:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.60.2.rt13.112.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2716
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2716",
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2716.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:33+00:00",
"generator": {
"date": "2025-10-09T20:53:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2716",
"initial_release_date": "2021-07-21T00:24:39+00:00",
"revision_history": [
{
"date": "2021-07-21T00:24:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:24:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2732
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2732",
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1899804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2732.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:47:26+00:00",
"generator": {
"date": "2025-10-09T20:47:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2732",
"initial_release_date": "2021-07-20T21:27:43+00:00",
"revision_history": [
{
"date": "2021-07-20T21:27:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:27:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:47:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.src",
"product_id": "kernel-0:3.10.0-693.90.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.90.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.90.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28374",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2020-11-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1899804"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SCSI target (LIO) write to any block on ILO backstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28374"
},
{
"category": "external",
"summary": "RHBZ#1899804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374"
}
],
"release_date": "2021-01-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: SCSI target (LIO) write to any block on ILO backstore"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2722
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2722",
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2722.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:52:44+00:00",
"generator": {
"date": "2024-11-15T11:52:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2722",
"initial_release_date": "2021-07-20T21:28:25+00:00",
"revision_history": [
{
"date": "2021-07-20T21:28:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:28:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.51.2.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product_id": "kernel-0:4.18.0-147.51.2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.51.2.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.51.2.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.51.2.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:28:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.51.2.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.51.2.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.51.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2735
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2735",
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1930246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2735.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:52:48+00:00",
"generator": {
"date": "2024-11-15T11:52:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2735",
"initial_release_date": "2021-07-20T21:02:15+00:00",
"revision_history": [
{
"date": "2021-07-20T21:02:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:02:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.src",
"product_id": "kernel-0:2.6.32-754.41.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "perf-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.i686",
"product_id": "perf-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x",
"product_id": "perf-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.41.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.41.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.41.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.41.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.41.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12362",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12362"
},
{
"category": "external",
"summary": "RHBZ#1930246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.41.2.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.41.2.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.41.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2729
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2729",
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2729.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2729",
"initial_release_date": "2021-07-21T00:47:07+00:00",
"revision_history": [
{
"date": "2021-07-21T00:47:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:47:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_30_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_31_3-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_33_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:47:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:47:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2729"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_30_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_31_3-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_33_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.src",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-0:1-1.el7.x86_64",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.EUS:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2714
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* pinctrl_emmitsburg: improper configuration (BZ#1963984)\n\n* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)\n\n* RHEL8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/RHEL8.4) (BZ#1964697)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)\n\n* backport fixes for Connection Tracking offload (BZ#1968679)\n\n* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)\n\n* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)\n\n* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)\n\n* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)\n\n* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)\n\n* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)\n\n* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)\n\n* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)\n\n* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)\n\n* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)\n\n* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)\n\n* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)\n\n* Backport netlink extack tracepoint (BZ#1972938)\n\n* [RHEL8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2714",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2714.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:31+00:00",
"generator": {
"date": "2024-11-15T11:52:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2714",
"initial_release_date": "2021-07-20T22:47:03+00:00",
"revision_history": [
{
"date": "2021-07-20T22:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:47:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2715
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z2 source tree (BZ#1975405)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2715",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2715.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:37+00:00",
"generator": {
"date": "2024-11-15T11:52:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2715",
"initial_release_date": "2021-07-20T20:59:11+00:00",
"revision_history": [
{
"date": "2021-07-20T20:59:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:59:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2730
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975159)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2730",
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2730.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2730",
"initial_release_date": "2021-07-20T21:35:01+00:00",
"revision_history": [
{
"date": "2021-07-20T21:35:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:35:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.src",
"product_id": "kernel-0:3.10.0-957.78.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.78.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.78.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2733
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2733",
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2733.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2733",
"initial_release_date": "2021-07-20T20:23:57+00:00",
"revision_history": [
{
"date": "2021-07-20T20:23:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:23:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.90.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.90.2.el7.src",
"product_id": "kernel-0:3.10.0-514.90.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.90.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.90.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.90.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2731
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2731",
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2731.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:53:28+00:00",
"generator": {
"date": "2024-11-15T11:53:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2731",
"initial_release_date": "2021-07-21T00:09:55+00:00",
"revision_history": [
{
"date": "2021-07-21T00:09:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:09:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:09:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2731"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2730
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975159)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2730",
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2730.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:08:47+00:00",
"generator": {
"date": "2025-10-09T22:08:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2730",
"initial_release_date": "2021-07-20T21:35:01+00:00",
"revision_history": [
{
"date": "2021-07-20T21:35:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:35:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.src",
"product_id": "kernel-0:3.10.0-957.78.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.78.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.78.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2730
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975159)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2730",
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2730.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:54+00:00",
"generator": {
"date": "2024-11-15T11:52:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2730",
"initial_release_date": "2021-07-20T21:35:01+00:00",
"revision_history": [
{
"date": "2021-07-20T21:35:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:35:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "perf-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.78.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.78.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.src",
"product_id": "kernel-0:3.10.0-957.78.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.78.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.78.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.78.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.78.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:35:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.78.2.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.78.2.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.78.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2720
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2720",
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2720.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:46+00:00",
"generator": {
"date": "2025-10-09T22:08:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2720",
"initial_release_date": "2021-07-21T00:20:41+00:00",
"revision_history": [
{
"date": "2021-07-21T00:20:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:20:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-10.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-8.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-5.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-10.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-8.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-5.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:20:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:20:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2720"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-10.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-8.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-5.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2732
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2732",
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1899804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2732.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:47:26+00:00",
"generator": {
"date": "2025-10-09T20:47:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2732",
"initial_release_date": "2021-07-20T21:27:43+00:00",
"revision_history": [
{
"date": "2021-07-20T21:27:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T21:27:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:47:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.src",
"product_id": "kernel-0:3.10.0-693.90.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.90.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.90.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.90.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.90.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28374",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2020-11-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1899804"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: SCSI target (LIO) write to any block on ILO backstore",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28374"
},
{
"category": "external",
"summary": "RHBZ#1899804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374"
}
],
"release_date": "2021-01-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: SCSI target (LIO) write to any block on ILO backstore"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T21:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.90.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.90.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2734
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* xfs umount hangs in xfs_wait_buftarg() due to negative bt_io_count (BZ#1949916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2734",
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2734.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:53:09+00:00",
"generator": {
"date": "2024-11-15T11:53:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2734",
"initial_release_date": "2021-07-20T20:06:55+00:00",
"revision_history": [
{
"date": "2021-07-20T20:06:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:06:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.98.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.98.2.el7.src",
"product_id": "kernel-0:3.10.0-327.98.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.98.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.98.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.98.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.98.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.98.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.98.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:06:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:06:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.98.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.98.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.98.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2737
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2737",
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2737.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.17",
"tracking": {
"current_release_date": "2024-11-15T11:53:47+00:00",
"generator": {
"date": "2024-11-15T11:53:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2737",
"initial_release_date": "2021-07-21T14:11:16+00:00",
"revision_history": [
{
"date": "2021-07-21T14:11:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T14:11:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:53:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.17-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.17-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.17-20210713.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.17-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.17-20210713.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T14:11:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T14:11:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2737"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.17-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.17-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.17-20210713.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.17-20210713.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2726
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z7 source tree (BZ#1967333)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2726",
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2726.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:32:44+00:00",
"generator": {
"date": "2025-10-09T19:32:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2726",
"initial_release_date": "2021-07-21T01:08:44+00:00",
"revision_history": [
{
"date": "2021-07-21T01:08:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T01:08:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:32:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.36.2.rt56.1179.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.36.2.rt56.1179.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.36.2.rt56.1179.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20934",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in show_numa_stats function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20934"
},
{
"category": "external",
"summary": "RHBZ#1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
}
],
"release_date": "2020-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in show_numa_stats function"
},
{
"cve": "CVE-2020-11668",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1824792"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11668"
},
{
"category": "external",
"summary": "RHBZ#1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
}
],
"release_date": "2020-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:08:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.36.2.rt56.1179.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.36.2.rt56.1179.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2736
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* ansible: multiple modules expose secured values (CVE-2021-3447)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The redhat-release-virtualization-host package no longer requires vdsm-hooks. In this release, the installation of vdsm-hooks is not mandatory for the Red Hat Virtualization Host. (BZ#1976095)\n\n* Previously, rhsmcertd was not enabled by default on the Red Hat Virtualization Host. As a result, the systems did not regularly report to RHSM while the subscription-manager reported no obvious issues and repositories were properly enabled.\nIn this release, rhsmcertd is enabled by default in RHVH, and as a result, RHSM now receives reports regularly. (BZ#1958145)\n\n* In this release, the Red Hat Virtualization Host has been rebased on top of the RHEL 8.4.0 Batch #1 update. For more information, see the RHEL release notes. (BZ#1957242)\n\n* Red Hat Virtualization Host now includes an updated scap-security-guide-rhv which allows you to apply a PCI DSS security profile to the system during installation, (BZ#1883793)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2736",
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1883793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883793"
},
{
"category": "external",
"summary": "1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "1955415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955415"
},
{
"category": "external",
"summary": "1957242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957242"
},
{
"category": "external",
"summary": "1958145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958145"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "1970970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970970"
},
{
"category": "external",
"summary": "1976005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976005"
},
{
"category": "external",
"summary": "1976095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976095"
},
{
"category": "external",
"summary": "1976118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976118"
},
{
"category": "external",
"summary": "1976146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976146"
},
{
"category": "external",
"summary": "1976148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976148"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2736.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-10-09T20:53:34+00:00",
"generator": {
"date": "2025-10-09T20:53:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2736",
"initial_release_date": "2021-07-22T15:09:21+00:00",
"revision_history": [
{
"date": "2021-07-22T15:09:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-22T15:09:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_id": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.54-2.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product_id": "imgbased-0:1.2.21-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.src",
"product": {
"name": "vhostmd-0:1.1-5.el8.src",
"product_id": "vhostmd-0:1.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.54-2.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-3.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210715.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debugsource@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debuginfo@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-devel@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debugsource@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debuginfo@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-debuginfo@1.1-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src"
},
"product_reference": "vhostmd-0:1.1-5.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.54-2.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"John Barker"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Felix Fontein"
]
},
{
"names": [
"Chen Zhi"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3447",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2021-03-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1939349"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: multiple modules expose secured values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Gluster Storage 3 no longer maintains its own version of ansible, prerequisite is to enable ansible repository in order to consume the latest version of ansible which has many bug and security fixes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "RHBZ#1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447"
}
],
"release_date": "2021-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: multiple modules expose secured values"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33910",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack. The highest threat from this vulnerability is to the system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not use strdupa to duplicate strings in unit_name_path_escape function, but strdup, which allocates space on the heap.\n\nFurther, any Red Hat product which is supported on the Red Hat Enterprise Linux platform is also potentially impacted. This includes:\n* Product containers which are based on the RHEL or UBI container images. These images are updated regularly, and container health indicating whether a fix to this flaw is available can be seen in the Container Health Index, part of the Red Hat Container Catalog (https://access.redhat.com/containers). In addition, any customer containers should be manually rebuilt when the base images are updated.\n* Products which pull packages from the RHEL channel. Please ensure that the underlying Red Hat Enterprise Linux systemd package is current in these product environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "RHBZ#1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash"
}
]
}
RHSA-2021:2725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [RHEL7.9.z] n_tty_open: \"BUG: unable to handle kernel paging request\" (BZ#1872778)\n\n* [ESXi][RHEL7.8]\"qp_alloc_hypercall result = -20\" / \"Could not attach to queue pair with -20\" with vSphere Fault Tolerance enabled (BZ#1892237)\n\n* [RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP (BZ#1910395)\n\n* False-positive hard lockup detected while processing the thread state information (SysRq-T) (BZ#1912221)\n\n* RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) (BZ#1917943)\n\n* The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console (BZ#1924688)\n\n* nvme hangs when trying to allocate reserved tag (BZ#1926825)\n\n* [REGRESSION] \"call into AER handling regardless of severity\" triggers do_recovery() unnecessarily on correctable PCIe errors (BZ#1933663)\n\n* Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793)\n\n* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! (BZ#1953052)\n\n* [Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed (BZ#1953075)\n\n* Kernel panic at cgroup_is_descendant (BZ#1957719)\n\n* [Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803)\n\n* IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1960193)\n\n* mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406)\n\n* incorrect assertion on pi_state-\u003epi_mutex.wait_lock from pi_state_update_owner() (BZ#1965495)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2725",
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:32:44+00:00",
"generator": {
"date": "2025-10-09T19:32:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2725",
"initial_release_date": "2021-07-21T01:17:48+00:00",
"revision_history": [
{
"date": "2021-07-21T01:17:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T01:17:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:32:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.36.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.36.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.36.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "perf-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.36.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20934",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1902788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in show_numa_stats function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20934"
},
{
"category": "external",
"summary": "RHBZ#1902788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20934"
}
],
"release_date": "2020-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "As the NUMA features are built-in and enabled by default, the NUMA functionality can be disabled at boot time by providing the kernel parameter, numa=off.\n\nThe method of providing this parameter depends on the operating system version, see KCS article https://access.redhat.com/solutions/23216.\n\nDisabling this feature may have significant performance impacts and the administrator should consider if the performance penalty is a problem.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in show_numa_stats function"
},
{
"cve": "CVE-2020-11668",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1824792"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11668"
},
{
"category": "external",
"summary": "RHBZ#1824792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
}
],
"release_date": "2020-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T01:17:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.36.2.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.36.2.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.36.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2733
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2733",
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2733.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T22:08:48+00:00",
"generator": {
"date": "2025-10-09T22:08:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2733",
"initial_release_date": "2021-07-20T20:23:57+00:00",
"revision_history": [
{
"date": "2021-07-20T20:23:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:23:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:08:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.90.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.90.2.el7.src",
"product_id": "kernel-0:3.10.0-514.90.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.90.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.90.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.90.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.90.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.90.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.90.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.90.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.90.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.90.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2716
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2716",
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2716.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:52:59+00:00",
"generator": {
"date": "2024-11-15T11:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2716",
"initial_release_date": "2021-07-21T00:24:39+00:00",
"revision_history": [
{
"date": "2021-07-21T00:24:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:24:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:2736
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* ansible: multiple modules expose secured values (CVE-2021-3447)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The redhat-release-virtualization-host package no longer requires vdsm-hooks. In this release, the installation of vdsm-hooks is not mandatory for the Red Hat Virtualization Host. (BZ#1976095)\n\n* Previously, rhsmcertd was not enabled by default on the Red Hat Virtualization Host. As a result, the systems did not regularly report to RHSM while the subscription-manager reported no obvious issues and repositories were properly enabled.\nIn this release, rhsmcertd is enabled by default in RHVH, and as a result, RHSM now receives reports regularly. (BZ#1958145)\n\n* In this release, the Red Hat Virtualization Host has been rebased on top of the RHEL 8.4.0 Batch #1 update. For more information, see the RHEL release notes. (BZ#1957242)\n\n* Red Hat Virtualization Host now includes an updated scap-security-guide-rhv which allows you to apply a PCI DSS security profile to the system during installation, (BZ#1883793)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2736",
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1883793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883793"
},
{
"category": "external",
"summary": "1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "1955415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955415"
},
{
"category": "external",
"summary": "1957242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957242"
},
{
"category": "external",
"summary": "1958145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958145"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "1970970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970970"
},
{
"category": "external",
"summary": "1976005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976005"
},
{
"category": "external",
"summary": "1976095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976095"
},
{
"category": "external",
"summary": "1976118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976118"
},
{
"category": "external",
"summary": "1976146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976146"
},
{
"category": "external",
"summary": "1976148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976148"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2736.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-10-09T20:53:34+00:00",
"generator": {
"date": "2025-10-09T20:53:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2736",
"initial_release_date": "2021-07-22T15:09:21+00:00",
"revision_history": [
{
"date": "2021-07-22T15:09:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-22T15:09:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_id": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.54-2.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product_id": "imgbased-0:1.2.21-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.src",
"product": {
"name": "vhostmd-0:1.1-5.el8.src",
"product_id": "vhostmd-0:1.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.54-2.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-3.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210715.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debugsource@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debuginfo@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-devel@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debugsource@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debuginfo@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-debuginfo@1.1-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src"
},
"product_reference": "vhostmd-0:1.1-5.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.54-2.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"John Barker"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Felix Fontein"
]
},
{
"names": [
"Chen Zhi"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3447",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2021-03-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1939349"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: multiple modules expose secured values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Gluster Storage 3 no longer maintains its own version of ansible, prerequisite is to enable ansible repository in order to consume the latest version of ansible which has many bug and security fixes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "RHBZ#1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447"
}
],
"release_date": "2021-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: multiple modules expose secured values"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33910",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack. The highest threat from this vulnerability is to the system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not use strdupa to duplicate strings in unit_name_path_escape function, but strdup, which allocates space on the heap.\n\nFurther, any Red Hat product which is supported on the Red Hat Enterprise Linux platform is also potentially impacted. This includes:\n* Product containers which are based on the RHEL or UBI container images. These images are updated regularly, and container health indicating whether a fix to this flaw is available can be seen in the Container Health Index, part of the Red Hat Container Catalog (https://access.redhat.com/containers). In addition, any customer containers should be manually rebuilt when the base images are updated.\n* Products which pull packages from the RHEL channel. Please ensure that the underlying Red Hat Enterprise Linux systemd package is current in these product environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "RHBZ#1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash"
}
]
}
CERTFR-2021-AVI-627
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
}
],
"initial_release_date": "2021-08-13T00:00:00",
"last_revision_date": "2021-08-13T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-627",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212678-1 du 12 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212678-1/"
}
]
}
CERTFR-2021-AVI-553
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian et Debian LTS. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian 9 stretch versions ant\u00e9rieures \u00e0 4.9.272-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian 9 stretch versions ant\u00e9rieures \u00e0 4.19.194-3~deb9u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian buster versions ant\u00e9rieures \u00e0 4.19.194-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36311"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-553",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian et Debian LTS. Elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dla-2713-2 du 20 juillet 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2713-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dla-2714 du 20 juillet 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2714"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dla-2713 du 20 juillet 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2713"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-4941 du 20 juillet 2021",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}
CERTFR-2021-AVI-550
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-550",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212415-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212415-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212408-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212408-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212407-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212407-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212416-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212416-1/"
}
]
}
CERTFR-2021-AVI-567
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-567",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2728 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2735 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2733 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2734 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2730 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2714 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
}
]
}
CERTFR-2024-AVI-0575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.4 antérieures à 22.4R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 23.2 antérieures à 23.2R2-S1 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.2 antérieures à SSR-6.2.5-r2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.4-EVO antérieures à 22.4R3-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.2-EVO antérieures à 23.2R2-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.2 antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.3-EVO antérieures à 21.3R3-S5-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.2-EVO antérieures à 21.2R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 20.4R3-S9 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R2-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.1 antérieures à SSR-6.1.8-lts | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 antérieures à 20.4R3-S10 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 antérieures à 22.2R3-S1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 21.4 antérieures à 21.4R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R1-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 antérieures à 22.2R3-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 23.2R1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R1-S1-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.4R3-S8 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R1-S1 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions antérieures à 21.2R3-S7 | ||
| Juniper Networks | N/A | Session Smart Router versions antérieures à SSR-5.6.14 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 antérieures à 22.1R3-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 antérieures à 22.3R3-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.4R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R1-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R1-S1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos Space versions antérieures à 24.1R1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 20.4R3-S10-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.4 antérieures à 22.4R3-S1 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R1-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R2-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à before 22.1R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R2-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 antérieures à 22.1R3-S4 | ||
| Juniper Networks | N/A | Junos OS versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 22.1R2-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R1-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R2-S1 | ||
| Juniper Networks | N/A | Junos OS versions 23.1 antérieures à 23.1R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R2-S2 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R1-S2-EVO |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 6.2 ant\u00e9rieures \u00e0 SSR-6.2.5-r2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.3-EVO ant\u00e9rieures \u00e0 21.3R3-S5-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R3-S7-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R2-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 6.1 ant\u00e9rieures \u00e0 SSR-6.1.8-lts",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S10",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 23.2R1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R1-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions ant\u00e9rieures \u00e0 21.2R3-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-5.6.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R1-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S10-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R1-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R2-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 before 22.1R3-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 22.1R2-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series with SPC3 line card versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R2-S1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.1 ant\u00e9rieures \u00e0 23.1R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on MX Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on QFX5000 Series and EX4600 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R2-S1-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-39560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39560"
},
{
"name": "CVE-2023-32435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2024-39554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39554"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-39539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39539"
},
{
"name": "CVE-2021-36160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2024-39558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39558"
},
{
"name": "CVE-2022-30522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30522"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-39552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39552"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2021-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29469"
},
{
"name": "CVE-2023-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2020-13950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2024-39546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39546"
},
{
"name": "CVE-2024-39540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39540"
},
{
"name": "CVE-2018-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3737"
},
{
"name": "CVE-2024-39543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39543"
},
{
"name": "CVE-2020-11984",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11984"
},
{
"name": "CVE-2022-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22721"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-39514",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39514"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-42013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42013"
},
{
"name": "CVE-2023-34059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
},
{
"name": "CVE-2024-39529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39529"
},
{
"name": "CVE-2006-20001",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2022-29167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29167"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2019-10747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10747"
},
{
"name": "CVE-2023-34058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
},
{
"name": "CVE-2011-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2019-10097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10097"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2024-39536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39536"
},
{
"name": "CVE-2024-39555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39555"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2020-13938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13938"
},
{
"name": "CVE-2016-10540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
},
{
"name": "CVE-2019-10082",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10082"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2016-1000232",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2024-39561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39561"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2020-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-41741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41741"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-39535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39535"
},
{
"name": "CVE-2024-39545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39545"
},
{
"name": "CVE-2024-39531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39531"
},
{
"name": "CVE-2022-41742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2019-10081",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10081"
},
{
"name": "CVE-2020-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1934"
},
{
"name": "CVE-2022-30556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30556"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2023-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
},
{
"name": "CVE-2024-39530",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39530"
},
{
"name": "CVE-2024-39532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39532"
},
{
"name": "CVE-2023-27522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
},
{
"name": "CVE-2024-39557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39557"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2024-39550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39550"
},
{
"name": "CVE-2022-28615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28615"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2014-10064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-10064"
},
{
"name": "CVE-2024-39511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39511"
},
{
"name": "CVE-2022-23943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23943"
},
{
"name": "CVE-2024-39548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39548"
},
{
"name": "CVE-2020-11993",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11993"
},
{
"name": "CVE-2023-22652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22652"
},
{
"name": "CVE-2024-39528",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39528"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2024-39559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39559"
},
{
"name": "CVE-2014-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7191"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-36049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36049"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2021-41524",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41524"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-39519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39519"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-2700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2700"
},
{
"name": "CVE-2020-7754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
},
{
"name": "CVE-2024-39533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39533"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-26690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
},
{
"name": "CVE-2022-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22719"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-46663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46663"
},
{
"name": "CVE-2011-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
},
{
"name": "CVE-2024-39513",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39513"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2024-39518",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39518"
},
{
"name": "CVE-2023-37450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
},
{
"name": "CVE-2021-30641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-7660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
},
{
"name": "CVE-2022-31813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31813"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2019-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9517"
},
{
"name": "CVE-2018-20834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20834"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2020-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1927"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"name": "CVE-2019-10092",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10092"
},
{
"name": "CVE-2024-39541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39541"
},
{
"name": "CVE-2021-44224",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44224"
},
{
"name": "CVE-2024-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39537"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2019-17567",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
},
{
"name": "CVE-2018-7408",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7408"
},
{
"name": "CVE-2019-20149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-39551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39551"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2022-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29404"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-39565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39565"
},
{
"name": "CVE-2021-31618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31618"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-39549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39549"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2021-33193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
},
{
"name": "CVE-2021-41773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41773"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2022-26377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2020-9490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9490"
},
{
"name": "CVE-2020-28502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28502"
},
{
"name": "CVE-2024-39556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39556"
},
{
"name": "CVE-2022-37436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2023-32439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2022-28330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28330"
},
{
"name": "CVE-2024-39542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39542"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2017-1000048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000048"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2019-10098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10098"
},
{
"name": "CVE-2024-39538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39538"
},
{
"name": "CVE-2022-28614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28614"
}
],
"initial_release_date": "2024-07-12T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0575",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83001",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Inconsistent-information-in-the-TE-database-can-lead-to-an-rpd-crash-CVE-2024-39541"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82976",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-The-802-1X-Authentication-Daemon-crashes-on-running-a-specific-command-CVE-2024-39511"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83027",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83021",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX4600-SRX5000-Series-TCP-packets-with-SYN-FIN-or-SYN-RST-are-transferred-after-enabling-no-syn-check-with-Express-Path-CVE-2024-39561"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83018",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-PIM-packet-causes-rpd-crash-when-PIM-is-configured-along-with-MoFRR-CVE-2024-39558"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82987",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crashes-upon-concurrent-deletion-of-a-routing-instance-and-receipt-of-an-SNMP-request-CVE-2024-39528"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82982",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX240-MX480-MX960-platforms-using-MPC10E-Memory-leak-will-be-observed-when-subscribed-to-a-specific-subscription-on-Junos-Telemetry-Interface-CVE-2024-39518"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83012",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-line-card-Port-flaps-causes-rtlogd-memory-leak-leading-to-Denial-of-Service-CVE-2024-39550"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83019",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-a-specific-TCP-packet-may-result-in-a-system-crash-vmcore-on-dual-RE-systems-with-NSR-enabled-CVE-2024-39559"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83004",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-large-RPKI-RTR-PDU-packet-can-cause-rpd-to-crash-CVE-2024-39543"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83010",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specific-packets-in-the-aftmand-process-will-lead-to-a-memory-leak-CVE-2024-39548"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83014",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-multipath-incremental-calculation-is-resulting-in-an-rpd-crash-CVE-2024-39554"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82996",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Flaps-of-BFD-sessions-with-authentication-cause-a-ppmd-memory-leak-CVE-2024-39536"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82980",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receiving-specific-traffic-on-devices-with-EVPN-VPWS-with-IGMP-snooping-enabled-will-cause-the-rpd-to-crash-CVE-2024-39514"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83000",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-Specific-valid-TCP-traffic-can-cause-a-pfe-crash-CVE-2024-39540"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83008",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Local-low-privilege-user-can-gain-root-permissions-leading-to-privilege-escalation-CVE-2024-39546"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82991",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Protocol-specific-DDoS-configuration-affects-other-protocols-CVE-2024-39531"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83011",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Receipt-of-malformed-BGP-path-attributes-leads-to-a-memory-leak-CVE-2024-39549"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82989",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Attempting-to-access-specific-sensors-on-platforms-not-supporting-these-will-lead-to-a-chassisd-crash-CVE-2024-39530"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82997",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Ports-which-have-been-inadvertently-exposed-can-be-reached-over-the-network-CVE-2024-39537"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83023",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-EX-Series-J-Web-An-unauthenticated-network-based-attacker-can-perform-XPATH-injection-attack-against-a-device-CVE-2024-39565"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83026",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R1-release"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83013",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-MS-MPC-MIC-Receipt-of-specific-packets-in-H-323-ALG-causes-traffic-drop-CVE-2024-39551"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83002",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-CFM-packet-or-specific-transit-traffic-leads-to-FPC-crash-CVE-2024-39542"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83015",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-update-causes-the-session-to-reset-CVE-2024-39555"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83007",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-NFX350-When-VPN-tunnels-parameters-are-not-matching-the-iked-process-will-crash-CVE-2024-39545"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82995",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-specific-traffic-is-received-in-a-VPLS-scenario-evo-pfemand-crashes-CVE-2024-39535"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82993",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4600-Series-Output-firewall-filter-is-not-applied-if-certain-match-criteria-are-used-CVE-2024-39533"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75726",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-UPDATE-causes-RPD-crash-CVE-2024-39552"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82988",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-If-DNS-traceoptions-are-configured-in-a-DGA-or-tunnel-detection-scenario-specific-DNS-traffic-leads-to-a-PFE-crash-CVE-2024-39529"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83017",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-MAC-table-changes-cause-a-memory-leak-CVE-2024-39557"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82983",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Multicast-traffic-is-looped-in-a-multihoming-EVPN-MPLS-scenario-CVE-2024-39519"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83020",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Memory-leak-due-to-RSVP-neighbor-persistent-error-leading-to-kernel-crash-CVE-2024-39560"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82998",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-multicast-traffic-with-a-specific-S-G-is-received-evo-pfemand-crashes-CVE-2024-39538"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82999",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-Continuous-subscriber-logins-will-lead-to-a-memory-leak-and-eventually-an-FPC-crash-CVE-2024-39539"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83016",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Loading-a-malicious-certificate-from-the-CLI-may-result-in-a-stack-based-overflow-CVE-2024-39556"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82992",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Confidential-information-in-logs-can-be-accessed-by-another-user-CVE-2024-39532"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82978",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Execution-of-a-specific-CLI-command-will-cause-a-crash-in-the-AFT-manager-CVE-2024-39513"
}
]
}
CERTFR-2022-AVI-733
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans SonicWall SMA1000. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SonicWall SMA1000 versions ant\u00e9rieures \u00e0 12.4.2-05082",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
}
],
"initial_release_date": "2022-08-11T00:00:00",
"last_revision_date": "2022-08-11T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-733",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SonicWall SMA1000.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SonicWall SMA1000",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SonicWall SNWLID-2022-0015 du 09 ao\u00fbt 2022",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
}
]
}
CERTFR-2021-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2021-34556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2014-7841",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7841"
},
{
"name": "CVE-2021-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-35477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2020-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-03T00:00:00",
"last_revision_date": "2021-12-03T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-916",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-202114849-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114849-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213877-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213877-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213876-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213876-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213848-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213848-1/"
}
]
}
CERTFR-2021-AVI-581
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-07-28T00:00:00",
"last_revision_date": "2021-07-30T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-581",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-28T00:00:00.000000"
},
{
"description": "Ajout des syst\u00e8mes affect\u00e9s et des bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 et suse-su-20212560-1 du 29 juillet 2021.",
"revision_date": "2021-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212542-1 du 28 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212542-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212560-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212560-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212538-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212538-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212559-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212487-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212487-1/"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-584
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
}
],
"initial_release_date": "2021-08-02T00:00:00",
"last_revision_date": "2021-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212577-1 du 30 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
}
]
}
CERTFR-2021-AVI-585
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"initial_release_date": "2021-08-03T00:00:00",
"last_revision_date": "2021-08-03T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212584-1 du 02 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212584-1/"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
}
],
"initial_release_date": "2023-01-23T00:00:00",
"last_revision_date": "2023-01-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-22T00:00:00",
"last_revision_date": "2021-07-22T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
CERTFR-2021-AVI-699
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"initial_release_date": "2021-09-14T00:00:00",
"last_revision_date": "2021-09-14T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-699",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0081-1 du 13 septembre 2021",
"url": "https://ubuntu.com/security/notices/LSN-0081-1"
}
]
}
CERTFR-2021-AVI-943
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Server versions 8.1.x antérieures à 8.1.13 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 7.1.x antérieures à 7.1.8.12 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 8.1.x antérieures à 8.1.13 | ||
| IBM | N/A | Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management version 2.2.x antérieures à 2.2.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 7.1.x ant\u00e9rieures \u00e0 7.1.8.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management version 2.2.x ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-39154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39154"
},
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-38947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38947"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-29505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29505"
},
{
"name": "CVE-2021-39146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39146"
},
{
"name": "CVE-2021-33502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-26258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26258"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2021-39149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39149"
},
{
"name": "CVE-2021-39065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39065"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-26259",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26259"
},
{
"name": "CVE-2021-39139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39139"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2021-39064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39064"
},
{
"name": "CVE-2021-39054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39054"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2021-39147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39147"
},
{
"name": "CVE-2021-39152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39152"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2021-39145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39145"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-39144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39144"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2020-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26217"
},
{
"name": "CVE-2021-39151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39151"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2021-39148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39148"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2021-39052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39052"
},
{
"name": "CVE-2021-39150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39150"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2021-39140",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39140"
},
{
"name": "CVE-2021-39058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39058"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2021-39153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39153"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32029"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-39053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39053"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2021-39141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39141"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2021-12-13T00:00:00",
"last_revision_date": "2021-12-13T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-943",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525034 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525034"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525250 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525250"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525260 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525260"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524712 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524712"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525674 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525674"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524908 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524908"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525554 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525554"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525182 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525182"
}
]
}
CERTFR-2021-AVI-573
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2021-07-26T00:00:00",
"last_revision_date": "2021-07-26T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-573",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2726 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2726"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2718 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2718"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2725 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2725"
}
]
}
CERTFR-2021-AVI-580
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
}
],
"initial_release_date": "2021-07-28T00:00:00",
"last_revision_date": "2021-07-28T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-580",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0079-1 du 27 juillet 2021",
"url": "https://ubuntu.com/security/notices/LSN-0079-1"
}
]
}
CERTFR-2021-AVI-552
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-552",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5014-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5014-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5016-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5016-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5017-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5017-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5018-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5018-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5015-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5015-1"
}
]
}
CERTFR-2021-AVI-551
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 - Extended Update Support 8.1 aarch64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-551",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2722 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2715 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2719 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2732 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
]
}
CERTFR-2024-AVI-0203
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | Cerberus PRO EN Engineering Tool versions antérieures à IP8 | ||
| Siemens | N/A | SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0 | ||
| Siemens | N/A | SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0 | ||
| Siemens | N/A | Sinteso FS20 EN Fire Panel FC20 versions antérieures à MP8 | ||
| Siemens | N/A | RUGGEDCOM APE1808 avec Fortinet NGFW versions antérieures à V7.4.1 | ||
| Siemens | N/A | Sinteso FS20 EN X200 Cloud Distribution versions V4.0.x antérieures à V4.0.5016 | ||
| Siemens | N/A | Cerberus PRO EN X200 Cloud Distribution versions V4.0.x antérieures à V4.0.5016 | ||
| Siemens | N/A | SENTRON 3KC ATC6 Expansion Module Ethernet toutes versions | ||
| Siemens | N/A | Sinteso FS20 EN Engineering Tool versions antérieures à MP8 | ||
| Siemens | N/A | SIMATIC RF160B (6GT2003-0FA00) versions antérieures à V2.2 | ||
| Siemens | N/A | SINEMA Remote Connect Server versions antérieures à V3.2 | ||
| Siemens | N/A | Solid Edge versions antérieures à V223.0.11 | ||
| Siemens | N/A | Siveillance Control versions supérieures ou égales à V2.8 versions antérieures à V3.1.1 | ||
| Siemens | N/A | Cerberus PRO EN X300 Cloud Distribution versions V4.3.x antérieures à V4.3.5617 | ||
| Siemens | N/A | Cerberus PRO EN Fire Panel FC72x versions antérieures à IP8 | ||
| Siemens | N/A | SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0 | ||
| Siemens | N/A | Sinteso FS20 EN X300 Cloud Distribution versions V4.2.x antérieures à V4.2.5015 | ||
| Siemens | N/A | SINEMA Remote Connect Client versions antérieures à V3.1 SP1 | ||
| Siemens | N/A | SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0 | ||
| Siemens | N/A | Cerberus PRO EN X300 Cloud Distribution versions V4.2.x antérieures à V4.2.5015 | ||
| Siemens | N/A | Sinteso FS20 EN X200 Cloud Distribution versions V4.3.x antérieures à V4.3.5618 | ||
| Siemens | N/A | Cerberus PRO EN X200 Cloud Distribution versions V4.3.x antérieures à V4.3.5618 | ||
| Siemens | N/A | Sinteso FS20 EN X300 Cloud Distribution versions V4.3.x antérieures à V4.3.5617 | ||
| Siemens | N/A | Sinteso Mobile versions antérieures à V3.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cerberus PRO EN Engineering Tool versions ant\u00e9rieures \u00e0 IP8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso FS20 EN Fire Panel FC20 versions ant\u00e9rieures \u00e0 MP8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 avec Fortinet NGFW versions ant\u00e9rieures \u00e0 V7.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso FS20 EN X200 Cloud Distribution versions V4.0.x ant\u00e9rieures \u00e0 V4.0.5016",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Cerberus PRO EN X200 Cloud Distribution versions V4.0.x ant\u00e9rieures \u00e0 V4.0.5016",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 3KC ATC6 Expansion Module Ethernet toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso FS20 EN Engineering Tool versions ant\u00e9rieures \u00e0 MP8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF160B (6GT2003-0FA00) versions ant\u00e9rieures \u00e0 V2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 V3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge versions ant\u00e9rieures \u00e0 V223.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siveillance Control versions sup\u00e9rieures ou \u00e9gales \u00e0 V2.8 versions ant\u00e9rieures \u00e0 V3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Cerberus PRO EN X300 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5617",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Cerberus PRO EN Fire Panel FC72x versions ant\u00e9rieures \u00e0 IP8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso FS20 EN X300 Cloud Distribution versions V4.2.x ant\u00e9rieures \u00e0 V4.2.5015",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Remote Connect Client versions ant\u00e9rieures \u00e0 V3.1 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Cerberus PRO EN X300 Cloud Distribution versions V4.2.x ant\u00e9rieures \u00e0 V4.2.5015",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso FS20 EN X200 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5618",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Cerberus PRO EN X200 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5618",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso FS20 EN X300 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5617",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sinteso Mobile versions ant\u00e9rieures \u00e0 V3.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0646"
},
{
"name": "CVE-2017-18509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"name": "CVE-2021-0599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0599"
},
{
"name": "CVE-2021-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0443"
},
{
"name": "CVE-2022-20462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20462"
},
{
"name": "CVE-2021-0598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0598"
},
{
"name": "CVE-2021-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0438"
},
{
"name": "CVE-2021-0651",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0651"
},
{
"name": "CVE-2021-0585",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0585"
},
{
"name": "CVE-2021-0331",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0331"
},
{
"name": "CVE-2021-0509",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0509"
},
{
"name": "CVE-2021-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0601"
},
{
"name": "CVE-2021-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0478"
},
{
"name": "CVE-2021-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0397"
},
{
"name": "CVE-2021-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0600"
},
{
"name": "CVE-2021-0928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0928"
},
{
"name": "CVE-2021-0484",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0484"
},
{
"name": "CVE-2023-36641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36641"
},
{
"name": "CVE-2021-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0642"
},
{
"name": "CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-41329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41329"
},
{
"name": "CVE-2021-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0597"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2021-0593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0593"
},
{
"name": "CVE-2022-20498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20498"
},
{
"name": "CVE-2021-0473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0473"
},
{
"name": "CVE-2022-41328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41328"
},
{
"name": "CVE-2022-42474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42474"
},
{
"name": "CVE-2021-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0870"
},
{
"name": "CVE-2020-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0417"
},
{
"name": "CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"name": "CVE-2021-0604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0604"
},
{
"name": "CVE-2021-0522",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0522"
},
{
"name": "CVE-2021-39629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39629"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2022-20229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20229"
},
{
"name": "CVE-2023-33306",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33306"
},
{
"name": "CVE-2022-39948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39948"
},
{
"name": "CVE-2022-20423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20423"
},
{
"name": "CVE-2021-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0396"
},
{
"name": "CVE-2021-0650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0650"
},
{
"name": "CVE-2021-0329",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0329"
},
{
"name": "CVE-2023-41675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41675"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-27997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27997"
},
{
"name": "CVE-2023-29183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29183"
},
{
"name": "CVE-2021-0471",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0471"
},
{
"name": "CVE-2023-29181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29181"
},
{
"name": "CVE-2021-0963",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0963"
},
{
"name": "CVE-2021-0327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0327"
},
{
"name": "CVE-2021-0653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0653"
},
{
"name": "CVE-2021-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0690"
},
{
"name": "CVE-2021-39634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39634"
},
{
"name": "CVE-2021-0596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0596"
},
{
"name": "CVE-2023-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47537"
},
{
"name": "CVE-2023-28002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28002"
},
{
"name": "CVE-2023-22641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22641"
},
{
"name": "CVE-2021-0919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0919"
},
{
"name": "CVE-2021-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0968"
},
{
"name": "CVE-2022-20500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20500"
},
{
"name": "CVE-2021-29647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"name": "CVE-2021-0521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0521"
},
{
"name": "CVE-2020-11301",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11301"
},
{
"name": "CVE-2021-0953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0953"
},
{
"name": "CVE-2021-0926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0926"
},
{
"name": "CVE-2021-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0961"
},
{
"name": "CVE-2023-26207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26207"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2021-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0652"
},
{
"name": "CVE-2021-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0339"
},
{
"name": "CVE-2021-39627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39627"
},
{
"name": "CVE-2021-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0437"
},
{
"name": "CVE-2023-29179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29179"
},
{
"name": "CVE-2021-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0433"
},
{
"name": "CVE-2024-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22041"
},
{
"name": "CVE-2023-33305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33305"
},
{
"name": "CVE-2022-20473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20473"
},
{
"name": "CVE-2022-43947",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43947"
},
{
"name": "CVE-2023-41841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41841"
},
{
"name": "CVE-2021-0333",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0333"
},
{
"name": "CVE-2022-20483",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20483"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2024-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22045"
},
{
"name": "CVE-2022-42476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42476"
},
{
"name": "CVE-2023-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49125"
},
{
"name": "CVE-2021-0399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0399"
},
{
"name": "CVE-2023-33301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33301"
},
{
"name": "CVE-2021-0476",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0476"
},
{
"name": "CVE-2021-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0507"
},
{
"name": "CVE-2021-0390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0390"
},
{
"name": "CVE-2021-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0444"
},
{
"name": "CVE-2021-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0520"
},
{
"name": "CVE-2021-0586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0586"
},
{
"name": "CVE-2021-39633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39633"
},
{
"name": "CVE-2021-0587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0587"
},
{
"name": "CVE-2021-0952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0952"
},
{
"name": "CVE-2022-20476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20476"
},
{
"name": "CVE-2020-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10768"
},
{
"name": "CVE-2022-20472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20472"
},
{
"name": "CVE-2021-0326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0326"
},
{
"name": "CVE-2021-0929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0929"
},
{
"name": "CVE-2022-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20227"
},
{
"name": "CVE-2021-0336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0336"
},
{
"name": "CVE-2023-44250",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44250"
},
{
"name": "CVE-2021-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0506"
},
{
"name": "CVE-2021-0515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0515"
},
{
"name": "CVE-2022-20355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20355"
},
{
"name": "CVE-2021-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0330"
},
{
"name": "CVE-2021-0688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0688"
},
{
"name": "CVE-2021-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0393"
},
{
"name": "CVE-2024-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21762"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2023-29178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29178"
},
{
"name": "CVE-2022-20130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20130"
},
{
"name": "CVE-2021-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0519"
},
{
"name": "CVE-2021-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0516"
},
{
"name": "CVE-2021-39621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39621"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2022-42469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42469"
},
{
"name": "CVE-2021-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1972"
},
{
"name": "CVE-2021-1976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1976"
},
{
"name": "CVE-2022-41327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41327"
},
{
"name": "CVE-2021-0640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0640"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2023-36555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36555"
},
{
"name": "CVE-2022-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"name": "CVE-2022-20468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20468"
},
{
"name": "CVE-2023-22640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22640"
},
{
"name": "CVE-2021-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0400"
},
{
"name": "CVE-2022-20469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20469"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0706",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0706"
},
{
"name": "CVE-2021-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0682"
},
{
"name": "CVE-2021-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0480"
},
{
"name": "CVE-2021-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0429"
},
{
"name": "CVE-2023-22639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22639"
},
{
"name": "CVE-2021-0683",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0683"
},
{
"name": "CVE-2022-20411",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20411"
},
{
"name": "CVE-2022-43953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43953"
},
{
"name": "CVE-2023-33307",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33307"
},
{
"name": "CVE-2021-0328",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0328"
},
{
"name": "CVE-2021-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0684"
},
{
"name": "CVE-2022-20466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20466"
},
{
"name": "CVE-2023-40718",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40718"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0704"
},
{
"name": "CVE-2022-20127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20127"
},
{
"name": "CVE-2021-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0436"
},
{
"name": "CVE-2021-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0584"
},
{
"name": "CVE-2022-45861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45861"
},
{
"name": "CVE-2021-0594",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0594"
},
{
"name": "CVE-2021-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0591"
},
{
"name": "CVE-2021-0514",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0514"
},
{
"name": "CVE-2021-0511",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0511"
},
{
"name": "CVE-2021-0931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0931"
},
{
"name": "CVE-2024-21483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21483"
},
{
"name": "CVE-2020-15436",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15436"
},
{
"name": "CVE-2023-45793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45793"
},
{
"name": "CVE-2021-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0689"
},
{
"name": "CVE-2023-28001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28001"
},
{
"name": "CVE-2021-0970",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0970"
},
{
"name": "CVE-2021-0337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0337"
},
{
"name": "CVE-2022-32257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32257"
},
{
"name": "CVE-2023-36639",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36639"
},
{
"name": "CVE-2021-39623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39623"
},
{
"name": "CVE-2022-41330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41330"
},
{
"name": "CVE-2021-0508",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0508"
},
{
"name": "CVE-2021-0325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0325"
},
{
"name": "CVE-2021-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0708"
},
{
"name": "CVE-2022-41334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41334"
},
{
"name": "CVE-2024-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23113"
},
{
"name": "CVE-2020-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0338"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-0302",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0302"
},
{
"name": "CVE-2021-0589",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0589"
},
{
"name": "CVE-2021-0305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0305"
},
{
"name": "CVE-2023-33308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33308"
},
{
"name": "CVE-2023-29175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29175"
},
{
"name": "CVE-2021-0431",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0431"
},
{
"name": "CVE-2021-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0392"
},
{
"name": "CVE-2021-0474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0474"
},
{
"name": "CVE-2021-0930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0930"
},
{
"name": "CVE-2021-39626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39626"
},
{
"name": "CVE-2021-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0967"
},
{
"name": "CVE-2023-25610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25610"
},
{
"name": "CVE-2023-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37935"
},
{
"name": "CVE-2021-0695",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0695"
},
{
"name": "CVE-2024-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22040"
},
{
"name": "CVE-2021-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0965"
},
{
"name": "CVE-2021-0513",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0513"
},
{
"name": "CVE-2021-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0434"
},
{
"name": "CVE-2021-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0687"
},
{
"name": "CVE-2021-0481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0481"
},
{
"name": "CVE-2021-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0964"
},
{
"name": "CVE-2021-0641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0641"
},
{
"name": "CVE-2021-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0435"
},
{
"name": "CVE-2021-0334",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0334"
},
{
"name": "CVE-2021-0933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0933"
},
{
"name": "CVE-2021-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0394"
},
{
"name": "CVE-2023-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29180"
},
{
"name": "CVE-2021-0588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0588"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2024-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22039"
},
{
"name": "CVE-2021-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0391"
},
{
"name": "CVE-2021-0510",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0510"
},
{
"name": "CVE-2021-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0692"
},
{
"name": "CVE-2024-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22044"
},
{
"name": "CVE-2020-14381",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
}
],
"initial_release_date": "2024-03-12T00:00:00",
"last_revision_date": "2024-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0203",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-792319 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-792319.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-918992 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-918992.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-353002 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-653855 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-653855.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-225840 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-145196 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-145196.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-382651 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-382651.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-832273 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-832273.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-366067 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-366067.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-770721 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-576771 du 12 mars 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-576771.html"
}
]
}
CERTFR-2021-AVI-920
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans les correctifs du 07 d\u00e9cembre 2021",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0904"
},
{
"name": "CVE-2021-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1017"
},
{
"name": "CVE-2021-39653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39653"
},
{
"name": "CVE-2021-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0996"
},
{
"name": "CVE-2021-39655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39655"
},
{
"name": "CVE-2021-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1004"
},
{
"name": "CVE-2021-1021",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1021"
},
{
"name": "CVE-2021-0982",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0982"
},
{
"name": "CVE-2021-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1020"
},
{
"name": "CVE-2021-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0989"
},
{
"name": "CVE-2021-1894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1894"
},
{
"name": "CVE-2021-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0995"
},
{
"name": "CVE-2021-0973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0973"
},
{
"name": "CVE-2021-39643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39643"
},
{
"name": "CVE-2021-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1012"
},
{
"name": "CVE-2021-30337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30337"
},
{
"name": "CVE-2021-1031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1031"
},
{
"name": "CVE-2021-30275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30275"
},
{
"name": "CVE-2021-30335",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30335"
},
{
"name": "CVE-2021-0969",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0969"
},
{
"name": "CVE-2021-1047",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1047"
},
{
"name": "CVE-2021-39644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39644"
},
{
"name": "CVE-2021-0986",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0986"
},
{
"name": "CVE-2021-30279",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30279"
},
{
"name": "CVE-2021-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0998"
},
{
"name": "CVE-2021-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1025"
},
{
"name": "CVE-2021-300269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-300269"
},
{
"name": "CVE-2021-39657",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39657"
},
{
"name": "CVE-2021-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1024"
},
{
"name": "CVE-2021-1007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1007"
},
{
"name": "CVE-2021-39645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39645"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-0984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0984"
},
{
"name": "CVE-2021-1022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1022"
},
{
"name": "CVE-2021-0991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0991"
},
{
"name": "CVE-2021-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30293"
},
{
"name": "CVE-2021-0963",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0963"
},
{
"name": "CVE-2021-39647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39647"
},
{
"name": "CVE-2021-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0999"
},
{
"name": "CVE-2021-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1005"
},
{
"name": "CVE-2021-1030",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1030"
},
{
"name": "CVE-2021-0956",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0956"
},
{
"name": "CVE-2021-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1032"
},
{
"name": "CVE-2021-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1009"
},
{
"name": "CVE-2021-39638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39638"
},
{
"name": "CVE-2021-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0968"
},
{
"name": "CVE-2021-0983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0983"
},
{
"name": "CVE-2021-0953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0953"
},
{
"name": "CVE-2021-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0961"
},
{
"name": "CVE-2021-39650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39650"
},
{
"name": "CVE-2021-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0966"
},
{
"name": "CVE-2021-39640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39640"
},
{
"name": "CVE-2021-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1016"
},
{
"name": "CVE-2021-0769",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0769"
},
{
"name": "CVE-2021-39652",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39652"
},
{
"name": "CVE-2021-30271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30271"
},
{
"name": "CVE-2021-1046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1046"
},
{
"name": "CVE-2021-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1013"
},
{
"name": "CVE-2021-1028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1028"
},
{
"name": "CVE-2021-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0987"
},
{
"name": "CVE-2021-0976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0976"
},
{
"name": "CVE-2021-0978",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0978"
},
{
"name": "CVE-2021-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1006"
},
{
"name": "CVE-2021-39649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39649"
},
{
"name": "CVE-2021-30273",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30273"
},
{
"name": "CVE-2021-30289",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30289"
},
{
"name": "CVE-2021-0952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0952"
},
{
"name": "CVE-2021-39646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39646"
},
{
"name": "CVE-2021-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0985"
},
{
"name": "CVE-2021-39637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39637"
},
{
"name": "CVE-2021-39642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39642"
},
{
"name": "CVE-2021-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1018"
},
{
"name": "CVE-2021-39639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39639"
},
{
"name": "CVE-2021-0955",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0955"
},
{
"name": "CVE-2021-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0675"
},
{
"name": "CVE-2021-1034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1034"
},
{
"name": "CVE-2021-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1019"
},
{
"name": "CVE-2021-1027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1027"
},
{
"name": "CVE-2021-30303",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30303"
},
{
"name": "CVE-2021-0979",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0979"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-30278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30278"
},
{
"name": "CVE-2021-1026",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1026"
},
{
"name": "CVE-2021-30268",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30268"
},
{
"name": "CVE-2021-30336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30336"
},
{
"name": "CVE-2021-1008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1008"
},
{
"name": "CVE-2021-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0994"
},
{
"name": "CVE-2021-0954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0954"
},
{
"name": "CVE-2021-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0958"
},
{
"name": "CVE-2021-30351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30351"
},
{
"name": "CVE-2021-0981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0981"
},
{
"name": "CVE-2021-30274",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30274"
},
{
"name": "CVE-2021-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0704"
},
{
"name": "CVE-2021-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0992"
},
{
"name": "CVE-2020-25668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25668"
},
{
"name": "CVE-2021-30270",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30270"
},
{
"name": "CVE-2021-0993",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0993"
},
{
"name": "CVE-2021-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1010"
},
{
"name": "CVE-2020-11263",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11263"
},
{
"name": "CVE-2021-39641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39641"
},
{
"name": "CVE-2021-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0997"
},
{
"name": "CVE-2021-0970",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0970"
},
{
"name": "CVE-2021-30298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30298"
},
{
"name": "CVE-2021-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0990"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-30262",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30262"
},
{
"name": "CVE-2021-0977",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0977"
},
{
"name": "CVE-2021-30282",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30282"
},
{
"name": "CVE-2021-30267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30267"
},
{
"name": "CVE-2021-30272",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30272"
},
{
"name": "CVE-2021-0971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0971"
},
{
"name": "CVE-2021-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1011"
},
{
"name": "CVE-2021-30276",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30276"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-1023",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1023"
},
{
"name": "CVE-2021-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0988"
},
{
"name": "CVE-2021-39651",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39651"
},
{
"name": "CVE-2021-1003",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1003"
},
{
"name": "CVE-2021-39656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39656"
},
{
"name": "CVE-2021-39648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39648"
},
{
"name": "CVE-2021-30283",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30283"
},
{
"name": "CVE-2021-1029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1029"
},
{
"name": "CVE-2021-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1015"
},
{
"name": "CVE-2021-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1918"
},
{
"name": "CVE-2021-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0967"
},
{
"name": "CVE-2021-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0965"
},
{
"name": "CVE-2021-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1001"
},
{
"name": "CVE-2021-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1014"
},
{
"name": "CVE-2021-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0964"
},
{
"name": "CVE-2021-39636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39636"
},
{
"name": "CVE-2021-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1002"
}
],
"initial_release_date": "2021-12-07T00:00:00",
"last_revision_date": "2021-12-07T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-920",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Android. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android 2012-12-01 du 06 d\u00e9cembre 2021",
"url": "https://source.android.com/security/bulletin/2021-12-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel 2012-12-01 du 06 d\u00e9cembre 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-12-01"
}
]
}
suse-su-2021:2487-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2487,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2487,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2484,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2485,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2486",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2487-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2487-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212487-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2487-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2021-07-27T15:25:57Z",
"generator": {
"date": "2021-07-27T15:25:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2487-1",
"initial_release_date": "2021-07-27T15:25:57Z",
"revision_history": [
{
"date": "2021-07-27T15:25:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_70-preempt-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:25:57Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-4-3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:25:57Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2438-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).\n- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: si5341: Update initialization magic (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch\n- fix patches metadata\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify \u0026 fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(\u0026port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: tcpm: update power supply once partner accepts (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors \u0026 warnings (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2438,SUSE-SLE-Module-Basesystem-15-SP2-2021-2438,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2438,SUSE-SLE-Module-Legacy-15-SP2-2021-2438,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2438,SUSE-SLE-Product-HA-15-SP2-2021-2438,SUSE-SLE-Product-WE-15-SP2-2021-2438,SUSE-SUSE-MicroOS-5.0-2021-2438",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2438-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2438-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2438-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T11:46:47Z",
"generator": {
"date": "2021-07-21T11:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2438-1",
"initial_release_date": "2021-07-21T11:46:47Z",
"revision_history": [
{
"date": "2021-07-21T11:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-extra-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.aarch64",
"product_id": "kernel-obs-build-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.aarch64",
"product_id": "kernel-syms-5.3.18-24.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.75.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-24.75.2.noarch",
"product_id": "kernel-devel-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-24.75.2.noarch",
"product_id": "kernel-docs-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-24.75.2.noarch",
"product_id": "kernel-docs-html-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-24.75.2.noarch",
"product_id": "kernel-macros-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-source-5.3.18-24.75.2.noarch",
"product_id": "kernel-source-5.3.18-24.75.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-24.75.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-24.75.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-24.75.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-debug-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-extra-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.ppc64le",
"product_id": "kernel-obs-build-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.ppc64le",
"product_id": "kernel-syms-5.3.18-24.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-devel-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-extra-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"product_id": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.s390x",
"product_id": "kernel-obs-build-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.s390x",
"product_id": "kernel-syms-5.3.18-24.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-24.75.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-24.75.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-24.75.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "dlm-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-debug-5.3.18-24.75.3.x86_64",
"product_id": "kernel-debug-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-debug-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"product_id": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.75.3.9.34.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-extra-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.75.3.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_75-preempt-1-5.3.3.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_75-preempt-1-5.3.3.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_75-preempt-1-5.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-24.75.3.x86_64",
"product_id": "kernel-obs-build-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.75.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-24.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.75.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-24.75.1.x86_64",
"product_id": "kernel-syms-5.3.18-24.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.75.3.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.75.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-24.75.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch"
},
"product_reference": "kernel-source-5.3.18-24.75.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.75.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-24.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.75.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.75.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_75-default-1-5.3.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.75.3.9.34.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.75.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.75.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.75.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.75.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T11:46:47Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2421-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).\n- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).\n- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).\n- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).\n- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()\n- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).\n- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).\n- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2421-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2421-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2421-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:01:19Z",
"generator": {
"date": "2021-07-21T09:01:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2421-1",
"initial_release_date": "2021-07-21T09:01:19Z",
"revision_history": [
{
"date": "2021-07-21T09:01:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product_id": "kernel-devel-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product_id": "kernel-macros-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product_id": "kernel-syms-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2560-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_56 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2560,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2560,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2561",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2560-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2560-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212560-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2560-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2021-07-29T11:24:43Z",
"generator": {
"date": "2021-07-29T11:24:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2560-1",
"initial_release_date": "2021-07-29T11:24:43Z",
"revision_history": [
{
"date": "2021-07-29T11:24:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:43Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:43Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:43Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2678-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).\n- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).\n- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).\n- ARM: ensure the signal page contains defined contents (bsc#1188445).\n- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).\n- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).\n- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).\n- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).\n- KVM: nVMX: Consult only the \u0027basic\u0027 exit reason when routing nested exit (bsc#1188773).\n- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).\n- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).\n- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).\n- RDMA/cma: Protect RMW with qp_mutex (git-fixes).\n- Revert \u0027ACPI: resources: Add checks for ACPI IRQ override\u0027 (git-fixes).\n- Revert \u0027USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem\u0027 (git-fixes).\n- Revert \u0027be2net: disable bh with spin_lock in be_process_mcc\u0027 (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1184631).\n- bcache: remove bcache device self-defined readahead (bsc#1184631).\n- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: do not disable an already disabled PCI device (git-fixes).\n- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).\n- cadence: force nonlinear buffers to be cloned (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188748).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).\n- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).\n- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).\n- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).\n- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).\n- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).\n- crypto: sun4i-ss - initialize need_fallback (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix IRQ free race during driver unload (git-fixes).\n- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).\n- drm/amd/display: Update scaling settings on modeset (git-fixes).\n- drm/amd/display: Verify Gamma \u0026 Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).\n- drm/amd/display: fix incorrrect valid irq check (git-fixes).\n- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).\n- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).\n- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).\n- drm/arm/malidp: Always list modifiers (git-fixes).\n- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).\n- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).\n- drm/msm/mdp4: Fix modifier support enabling (git-fixes).\n- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/sched: Avoid data corruptions (git-fixes).\n- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).\n- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- e1000e: Check the PCIm state (git-fixes).\n- e1000e: Fix an error handling path in \u0027e1000_probe()\u0027 (git-fixes).\n- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).\n- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).\n- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).\n- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- i2c: core: Disable client irq on reboot/shutdown (git-fixes).\n- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).\n- i40e: Fix error handling in i40e_vsi_open (git-fixes).\n- iavf: Fix an error handling path in \u0027iavf_probe()\u0027 (git-fixes).\n- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).\n- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).\n- igb: Fix an error handling path in \u0027igb_probe()\u0027 (git-fixes).\n- igb: Fix position of assignment to *ring (git-fixes).\n- igb: Fix use-after-free error during reset (git-fixes).\n- igc: Fix an error handling path in \u0027igc_probe()\u0027 (git-fixes).\n- igc: Fix use-after-free error during reset (git-fixes).\n- igc: change default return of igc_read_phy_reg() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).\n- ixgbe: Fix an error handling path in \u0027ixgbe_probe()\u0027 (git-fixes).\n- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).\n- kABI workaround for pci/quirks.c (git-fixes).\n- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).\n- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).\n- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).\n- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).\n- kprobes: fix kill kprobe which has been marked as gone (git-fixes).\n- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).\n- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- media, bpf: Do not copy more entries than user space requested (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).\n- misc: alcor_pci: fix inverted branch condition (git-fixes).\n- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mt76: mt7603: set 0 as min coverage_class value (git-fixes).\n- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).\n- mt76: mt7615: increase MCU command timeout (git-fixes).\n- mt76: set dma-done flag for flushed descriptors (git-fixes).\n- mvpp2: suppress warning (git-fixes).\n- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).\n- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).\n- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).\n- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mvpp2: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).\n- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).\n- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).\n- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).\n- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- powerpc/stacktrace: Fix spurious \u0027stale\u0027 traces in raise_backtrace_ipi() (bsc#1156395).\n- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).\n- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).\n- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).\n- pwm: imx1: Do not disable clocks at device remove time (git-fixes).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).\n- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).\n- r8152: Fix potential PM refcount imbalance (bsc#1186194).\n- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).\n- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).\n- rbd: always kick acquire on \u0027acquired\u0027 and \u0027released\u0027 notifications (bsc#1188746).\n- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).\n- regulator: hi6421: Fix getting wrong drvdata (git-fixes).\n- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).\n- replaced with upstream security mitigation cleanup\n- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).\n- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- sfp: Fix error handing in sfp_probe() (git-fixes).\n- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).\n- spi: cadence: Correct initialisation of runtime PM again (git-fixes).\n- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).\n- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).\n- tpm: efi: Use local variable for calculating final log size (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).\n- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- virtio_net: move tx vq operation under tx queue lock (git-fixes).\n- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- xen/events: reset active flag for lateeoi events later (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2678,SUSE-SLE-Module-RT-15-SP2-2021-2678,SUSE-SUSE-MicroOS-5.0-2021-2678",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2678-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2678-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212678-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2678-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1184631",
"url": "https://bugzilla.suse.com/1184631"
},
{
"category": "self",
"summary": "SUSE Bug 1185377",
"url": "https://bugzilla.suse.com/1185377"
},
{
"category": "self",
"summary": "SUSE Bug 1186194",
"url": "https://bugzilla.suse.com/1186194"
},
{
"category": "self",
"summary": "SUSE Bug 1186482",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "self",
"summary": "SUSE Bug 1186483",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "self",
"summary": "SUSE Bug 1187476",
"url": "https://bugzilla.suse.com/1187476"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188101",
"url": "https://bugzilla.suse.com/1188101"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188445",
"url": "https://bugzilla.suse.com/1188445"
},
{
"category": "self",
"summary": "SUSE Bug 1188504",
"url": "https://bugzilla.suse.com/1188504"
},
{
"category": "self",
"summary": "SUSE Bug 1188620",
"url": "https://bugzilla.suse.com/1188620"
},
{
"category": "self",
"summary": "SUSE Bug 1188683",
"url": "https://bugzilla.suse.com/1188683"
},
{
"category": "self",
"summary": "SUSE Bug 1188746",
"url": "https://bugzilla.suse.com/1188746"
},
{
"category": "self",
"summary": "SUSE Bug 1188747",
"url": "https://bugzilla.suse.com/1188747"
},
{
"category": "self",
"summary": "SUSE Bug 1188748",
"url": "https://bugzilla.suse.com/1188748"
},
{
"category": "self",
"summary": "SUSE Bug 1188770",
"url": "https://bugzilla.suse.com/1188770"
},
{
"category": "self",
"summary": "SUSE Bug 1188771",
"url": "https://bugzilla.suse.com/1188771"
},
{
"category": "self",
"summary": "SUSE Bug 1188772",
"url": "https://bugzilla.suse.com/1188772"
},
{
"category": "self",
"summary": "SUSE Bug 1188773",
"url": "https://bugzilla.suse.com/1188773"
},
{
"category": "self",
"summary": "SUSE Bug 1188774",
"url": "https://bugzilla.suse.com/1188774"
},
{
"category": "self",
"summary": "SUSE Bug 1188777",
"url": "https://bugzilla.suse.com/1188777"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188842",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1188973",
"url": "https://bugzilla.suse.com/1188973"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21781 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22543 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-08-12T12:23:31Z",
"generator": {
"date": "2021-08-12T12:23:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2678-1",
"initial_release_date": "2021-08-12T12:23:31Z",
"revision_history": [
{
"date": "2021-08-12T12:23:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-48.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-48.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-48.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-48.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-48.1.noarch",
"product_id": "kernel-source-rt-5.3.18-48.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-48.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-48.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-48.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-48.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-48.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-48.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-48.1.x86_64",
"product_id": "kernel-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-48.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-48.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-48.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-48.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-48.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-48.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-48.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-48.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-48.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-48.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-48.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-48.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-48.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-48.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-48.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-48.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-48.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-48.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-48.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-48.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP2",
"product": {
"name": "SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-48.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-48.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-48.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-48.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-48.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-48.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-21781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21781"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process\u0027s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21781",
"url": "https://www.suse.com/security/cve/CVE-2021-21781"
},
{
"category": "external",
"summary": "SUSE Bug 1188445 for CVE-2021-21781",
"url": "https://bugzilla.suse.com/1188445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T12:23:31Z",
"details": "low"
}
],
"title": "CVE-2021-21781"
},
{
"cve": "CVE-2021-22543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22543"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22543",
"url": "https://www.suse.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "SUSE Bug 1186482 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "external",
"summary": "SUSE Bug 1186483 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1197660 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1197660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T12:23:31Z",
"details": "important"
}
],
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T12:23:31Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T12:23:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-48.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-48.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-48.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T12:23:31Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
}
]
}
suse-su-2021:3876-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n- CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes (bnc#1190479).\n- CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2021-3759: Unaccounted ipc objects could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).\n- CVE-2021-3752: Fixed a use after free vulnerability in the bluetooth module. (bsc#1190023)\n- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2020-12770: An issue was discovered in the Linux kernel sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040 (bnc#1171420).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario (bnc#1133374).\n- CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. (bnc#1129898).\n- CVE-2018-9517: In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108488).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#0 bnc#1177666 bnc#1181158).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).\n- CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bnc#1186482 bnc#1190276).\n- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062 bnc#1188063).\n\nThe following non-security bugs were fixed:\n\n- Add arch-dependent support markers in supported.conf (bsc#1186672) \n- Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1191888).\n- config: disable unprivileged BPF by default (jsc#SLE-22913)\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- hisax: fix spectre issues (bsc#1192802).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).\n- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mm/memory.c: do_fault: avoid usage of stale vm_area_struct (bsc#1136513).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).\n- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).\n- Revert \u0027memcg: enable accounting for file lock caches (bsc#1190115).\u0027 This reverts commit 912b4421a3e9bb9f0ef1aadc64a436666259bd4d. It\u0027s effectively upstream commit 3754707bcc3e190e5dadc978d172b61e809cb3bd applied to kernel-source (to avoid proliferation of patches). Make a note in blacklist.conf too.\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scripts/git_sort/git_sort.py: Update nvme repositories\n- scsi: libfc: Fix array index out of bound exception (bsc#1188616).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1191349).\n- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349 bsc#1191457).\n- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1191349 bsc#1191457).\n- scsi: target: avoid using lun_tg_pt_gp after unlock (bsc#1186078).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- target: core: Fix sense key for invalid XCOPY request (bsc#1186078).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Use /usr/lib/modules as module dir when usermerge is active in the target distro.\n- UsrMerge the kernel (boo#1184804)\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3876,SUSE-SLE-Module-Live-Patching-15-SP1-2021-3876,SUSE-SLE-Product-HA-15-SP1-2021-3876,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3876,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3876,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3876,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3876,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3876,SUSE-Storage-6-2021-3876",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3876-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3876-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213876-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3876-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html"
},
{
"category": "self",
"summary": "SUSE Bug 1100416",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "self",
"summary": "SUSE Bug 1108488",
"url": "https://bugzilla.suse.com/1108488"
},
{
"category": "self",
"summary": "SUSE Bug 1129735",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "self",
"summary": "SUSE Bug 1129898",
"url": "https://bugzilla.suse.com/1129898"
},
{
"category": "self",
"summary": "SUSE Bug 1133374",
"url": "https://bugzilla.suse.com/1133374"
},
{
"category": "self",
"summary": "SUSE Bug 1136513",
"url": "https://bugzilla.suse.com/1136513"
},
{
"category": "self",
"summary": "SUSE Bug 1171420",
"url": "https://bugzilla.suse.com/1171420"
},
{
"category": "self",
"summary": "SUSE Bug 1176724",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1181158",
"url": "https://bugzilla.suse.com/1181158"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185377",
"url": "https://bugzilla.suse.com/1185377"
},
{
"category": "self",
"summary": "SUSE Bug 1185726",
"url": "https://bugzilla.suse.com/1185726"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185973",
"url": "https://bugzilla.suse.com/1185973"
},
{
"category": "self",
"summary": "SUSE Bug 1186078",
"url": "https://bugzilla.suse.com/1186078"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186482",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188172",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1188616",
"url": "https://bugzilla.suse.com/1188616"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188983",
"url": "https://bugzilla.suse.com/1188983"
},
{
"category": "self",
"summary": "SUSE Bug 1188985",
"url": "https://bugzilla.suse.com/1188985"
},
{
"category": "self",
"summary": "SUSE Bug 1189057",
"url": "https://bugzilla.suse.com/1189057"
},
{
"category": "self",
"summary": "SUSE Bug 1189262",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "self",
"summary": "SUSE Bug 1189291",
"url": "https://bugzilla.suse.com/1189291"
},
{
"category": "self",
"summary": "SUSE Bug 1189399",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "self",
"summary": "SUSE Bug 1189400",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "self",
"summary": "SUSE Bug 1189706",
"url": "https://bugzilla.suse.com/1189706"
},
{
"category": "self",
"summary": "SUSE Bug 1189846",
"url": "https://bugzilla.suse.com/1189846"
},
{
"category": "self",
"summary": "SUSE Bug 1189884",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "self",
"summary": "SUSE Bug 1190023",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "self",
"summary": "SUSE Bug 1190025",
"url": "https://bugzilla.suse.com/1190025"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190115",
"url": "https://bugzilla.suse.com/1190115"
},
{
"category": "self",
"summary": "SUSE Bug 1190117",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "self",
"summary": "SUSE Bug 1190159",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "self",
"summary": "SUSE Bug 1190276",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "self",
"summary": "SUSE Bug 1190349",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190479",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "self",
"summary": "SUSE Bug 1190534",
"url": "https://bugzilla.suse.com/1190534"
},
{
"category": "self",
"summary": "SUSE Bug 1190601",
"url": "https://bugzilla.suse.com/1190601"
},
{
"category": "self",
"summary": "SUSE Bug 1190717",
"url": "https://bugzilla.suse.com/1190717"
},
{
"category": "self",
"summary": "SUSE Bug 1191193",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191317",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "self",
"summary": "SUSE Bug 1191349",
"url": "https://bugzilla.suse.com/1191349"
},
{
"category": "self",
"summary": "SUSE Bug 1191457",
"url": "https://bugzilla.suse.com/1191457"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191800",
"url": "https://bugzilla.suse.com/1191800"
},
{
"category": "self",
"summary": "SUSE Bug 1191888",
"url": "https://bugzilla.suse.com/1191888"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192379",
"url": "https://bugzilla.suse.com/1192379"
},
{
"category": "self",
"summary": "SUSE Bug 1192400",
"url": "https://bugzilla.suse.com/1192400"
},
{
"category": "self",
"summary": "SUSE Bug 1192775",
"url": "https://bugzilla.suse.com/1192775"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13405 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3874 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3900 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0429 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12770 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-4788 page",
"url": "https://www.suse.com/security/cve/CVE-2020-4788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22543 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34556 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35477 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3679 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3732 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3752 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3764 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38160 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-40490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-40490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41864 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-02T07:19:48Z",
"generator": {
"date": "2021-12-02T07:19:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3876-1",
"initial_release_date": "2021-12-02T07:19:48Z",
"revision_history": [
{
"date": "2021-12-02T07:19:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.102.2.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.102.2.aarch64",
"product_id": "kernel-default-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.102.2.aarch64",
"product_id": "kernel-default-base-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.102.2.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.102.2.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.102.2.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.102.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.102.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.102.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.102.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.102.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.102.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.102.2.aarch64",
"product_id": "kernel-syms-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.102.2.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.102.2.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.102.2.noarch",
"product_id": "kernel-devel-4.12.14-197.102.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.102.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.102.2.noarch",
"product_id": "kernel-docs-4.12.14-197.102.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.102.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.102.2.noarch",
"product_id": "kernel-docs-html-4.12.14-197.102.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.102.2.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.102.2.noarch",
"product_id": "kernel-macros-4.12.14-197.102.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.102.2.noarch",
"product": {
"name": "kernel-source-4.12.14-197.102.2.noarch",
"product_id": "kernel-source-4.12.14-197.102.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.102.2.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.102.2.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.102.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-debug-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-default-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.102.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.102.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.102.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.102.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-syms-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.102.2.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.102.2.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.102.2.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.102.2.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-base-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-devel-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-extra-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.102.2.s390x",
"product_id": "kernel-default-man-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.102.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.102.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.102.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.102.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.102.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.102.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.102.2.s390x",
"product_id": "kernel-syms-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.102.2.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.102.2.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.102.2.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.102.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.102.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.102.2.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.102.2.x86_64",
"product_id": "kernel-debug-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.102.2.x86_64",
"product_id": "kernel-default-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-default-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.102.2.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.102.2.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.102.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.102.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.102.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.102.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64",
"product_id": "kernel-syms-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.102.2.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-source-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-source-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-source-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-default-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-source-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-source-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.102.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.102.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.102.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch"
},
"product_reference": "kernel-source-4.12.14-197.102.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-13405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13405"
}
],
"notes": [
{
"category": "general",
"text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13405",
"url": "https://www.suse.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1100416 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "external",
"summary": "SUSE Bug 1129735 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "external",
"summary": "SUSE Bug 1195161 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1195161"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2018-9517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9517"
}
],
"notes": [
{
"category": "general",
"text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9517",
"url": "https://www.suse.com/security/cve/CVE-2018-9517"
},
{
"category": "external",
"summary": "SUSE Bug 1108488 for CVE-2018-9517",
"url": "https://bugzilla.suse.com/1108488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "low"
}
],
"title": "CVE-2018-9517"
},
{
"cve": "CVE-2019-3874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3874"
}
],
"notes": [
{
"category": "general",
"text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3874",
"url": "https://www.suse.com/security/cve/CVE-2019-3874"
},
{
"category": "external",
"summary": "SUSE Bug 1129898 for CVE-2019-3874",
"url": "https://bugzilla.suse.com/1129898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2019-3874"
},
{
"cve": "CVE-2019-3900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3900"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3900",
"url": "https://www.suse.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "SUSE Bug 1133374 for CVE-2019-3900",
"url": "https://bugzilla.suse.com/1133374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2019-3900"
},
{
"cve": "CVE-2020-0429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0429"
}
],
"notes": [
{
"category": "general",
"text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0429",
"url": "https://www.suse.com/security/cve/CVE-2020-0429"
},
{
"category": "external",
"summary": "SUSE Bug 1176724 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "external",
"summary": "SUSE Bug 1176931 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "external",
"summary": "SUSE Bug 1188026 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1188026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-0429"
},
{
"cve": "CVE-2020-12770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12770"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12770",
"url": "https://www.suse.com/security/cve/CVE-2020-12770"
},
{
"category": "external",
"summary": "SUSE Bug 1171420 for CVE-2020-12770",
"url": "https://bugzilla.suse.com/1171420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-12770"
},
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2020-4788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-4788"
}
],
"notes": [
{
"category": "general",
"text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-4788",
"url": "https://www.suse.com/security/cve/CVE-2020-4788"
},
{
"category": "external",
"summary": "SUSE Bug 1177666 for CVE-2020-4788",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "external",
"summary": "SUSE Bug 1181158 for CVE-2020-4788",
"url": "https://bugzilla.suse.com/1181158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-4788"
},
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-22543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22543"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22543",
"url": "https://www.suse.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "SUSE Bug 1186482 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "external",
"summary": "SUSE Bug 1186483 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1197660 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1197660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34556"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34556",
"url": "https://www.suse.com/security/cve/CVE-2021-34556"
},
{
"category": "external",
"summary": "SUSE Bug 1188983 for CVE-2021-34556",
"url": "https://bugzilla.suse.com/1188983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-34556"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-35477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35477"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35477",
"url": "https://www.suse.com/security/cve/CVE-2021-35477"
},
{
"category": "external",
"summary": "SUSE Bug 1188985 for CVE-2021-35477",
"url": "https://bugzilla.suse.com/1188985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-35477"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "low"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-3679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3679"
}
],
"notes": [
{
"category": "general",
"text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3679",
"url": "https://www.suse.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "SUSE Bug 1189057 for CVE-2021-3679",
"url": "https://bugzilla.suse.com/1189057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3679"
},
{
"cve": "CVE-2021-3715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3715"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3715",
"url": "https://www.suse.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "SUSE Bug 1190349 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "external",
"summary": "SUSE Bug 1190350 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190350"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1196722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3732",
"url": "https://www.suse.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "SUSE Bug 1189706 for CVE-2021-3732",
"url": "https://bugzilla.suse.com/1189706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "low"
}
],
"title": "CVE-2021-3732"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3752"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3752",
"url": "https://www.suse.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "SUSE Bug 1190023 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "external",
"summary": "SUSE Bug 1190432 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "low"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3764"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3764",
"url": "https://www.suse.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3764",
"url": "https://bugzilla.suse.com/1190534"
},
{
"category": "external",
"summary": "SUSE Bug 1194518 for CVE-2021-3764",
"url": "https://bugzilla.suse.com/1194518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3764"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-38160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38160"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38160",
"url": "https://www.suse.com/security/cve/CVE-2021-38160"
},
{
"category": "external",
"summary": "SUSE Bug 1190117 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "external",
"summary": "SUSE Bug 1190118 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190118"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-38160"
},
{
"cve": "CVE-2021-38198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38198"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38198",
"url": "https://www.suse.com/security/cve/CVE-2021-38198"
},
{
"category": "external",
"summary": "SUSE Bug 1189262 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "external",
"summary": "SUSE Bug 1189278 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-38198"
},
{
"cve": "CVE-2021-38204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38204"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38204",
"url": "https://www.suse.com/security/cve/CVE-2021-38204"
},
{
"category": "external",
"summary": "SUSE Bug 1189291 for CVE-2021-38204",
"url": "https://bugzilla.suse.com/1189291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-40490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-40490"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-40490",
"url": "https://www.suse.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "SUSE Bug 1190159 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "external",
"summary": "SUSE Bug 1192775 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1192775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-40490"
},
{
"cve": "CVE-2021-41864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41864"
}
],
"notes": [
{
"category": "general",
"text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41864",
"url": "https://www.suse.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "SUSE Bug 1191317 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "external",
"summary": "SUSE Bug 1191318 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42252"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42252",
"url": "https://www.suse.com/security/cve/CVE-2021-42252"
},
{
"category": "external",
"summary": "SUSE Bug 1190479 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "external",
"summary": "SUSE Bug 1192444 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1192444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-42252"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_102-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.102.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.102.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.102.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.102.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-02T07:19:48Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
}
]
}
suse-su-2021:2415-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nSecurity issues fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2415,SUSE-SLE-Module-Basesystem-15-SP3-2021-2415,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2415,SUSE-SLE-Module-Legacy-15-SP3-2021-2415,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2415,SUSE-SLE-Product-HA-15-SP3-2021-2415,SUSE-SLE-Product-WE-15-SP3-2021-2415",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2415-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2415-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212415-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2415-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T14:12:08Z",
"generator": {
"date": "2021-07-20T14:12:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2415-1",
"initial_release_date": "2021-07-20T14:12:08Z",
"revision_history": [
{
"date": "2021-07-20T14:12:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-59.16.1.aarch64",
"product_id": "dtb-al-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-59.16.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-59.16.1.aarch64",
"product_id": "dtb-altera-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-59.16.1.aarch64",
"product_id": "dtb-amd-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-59.16.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-59.16.1.aarch64",
"product_id": "dtb-apm-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-59.16.1.aarch64",
"product_id": "dtb-arm-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-59.16.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-59.16.1.aarch64",
"product_id": "dtb-cavium-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-59.16.1.aarch64",
"product_id": "dtb-exynos-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-59.16.1.aarch64",
"product_id": "dtb-freescale-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-59.16.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-59.16.1.aarch64",
"product_id": "dtb-lg-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-59.16.1.aarch64",
"product_id": "dtb-marvell-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-59.16.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-59.16.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-59.16.1.aarch64",
"product_id": "dtb-qcom-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-59.16.1.aarch64",
"product_id": "dtb-renesas-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-59.16.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-59.16.1.aarch64",
"product_id": "dtb-socionext-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-59.16.1.aarch64",
"product_id": "dtb-sprd-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-59.16.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-59.16.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-59.16.1.aarch64",
"product_id": "dtb-zte-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.16.1.noarch",
"product_id": "kernel-devel-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.16.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.16.1.noarch",
"product_id": "kernel-macros-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-5.3.18-59.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.16.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.s390x",
"product_id": "kernel-syms-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_16-preempt-1-7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_16-preempt-1-7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_16-preempt-1-7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.16.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.16.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.16.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.16.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:12:08Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_16-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.16.1.18.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.16.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.16.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:12:08Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2559-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-59_10 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2559,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2559",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2559-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2559-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212559-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2559-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2021-07-29T11:24:20Z",
"generator": {
"date": "2021-07-29T11:24:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2559-1",
"initial_release_date": "2021-07-29T11:24:20Z",
"revision_history": [
{
"date": "2021-07-29T11:24:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-preempt-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:20Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-29T11:24:20Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2407-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bnc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges (bsc#1188062).\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation (bsc#1187050).\n\nThe following non-security bugs were fixed:\n\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: flexcan: disable completely the ECC mechanism (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: xilinx_can: xcan_chip_start(): fix failure with invalid bus (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (12sp5).\n- cxgb4: fix wrong shift (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mlxsw: spectrum: Do not process learned records with a dummy FID (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net: dsa: qca8k: Use up to 7 ports for all operations (git-fixes).\n- net: stmmac: Correctly take timestamp for PTPv2 (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1188010).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2407,SUSE-SLE-SERVER-12-SP5-2021-2407",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2407-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2407-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212407-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2407-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1185995",
"url": "https://bugzilla.suse.com/1185995"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188010",
"url": "https://bugzilla.suse.com/1188010"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188273",
"url": "https://bugzilla.suse.com/1188273"
},
{
"category": "self",
"summary": "SUSE Bug 1188274",
"url": "https://bugzilla.suse.com/1188274"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:21Z",
"generator": {
"date": "2021-07-20T12:40:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2407-1",
"initial_release_date": "2021-07-20T12:40:21Z",
"revision_history": [
{
"date": "2021-07-20T12:40:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.65.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.65.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.65.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.65.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.65.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.65.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.65.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.65.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.65.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:21Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2584-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_72 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2584,SUSE-SLE-Live-Patching-12-SP4-2021-2584,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2585",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2584-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2584-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212584-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2584-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2021-08-02T07:44:17Z",
"generator": {
"date": "2021-08-02T07:44:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2584-1",
"initial_release_date": "2021-08-02T07:44:17Z",
"revision_history": [
{
"date": "2021-08-02T07:44:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-02T07:44:17Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-02T07:44:17Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-9-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-02T07:44:17Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2427-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)\n\nThe following non-security bugs were fixed:\n\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- x86/crash: Add e820 reserved ranges to kdump kernel\u0027s e820 table (bsc#1181193).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).\n- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2427,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2427,SUSE-SLE-Product-HA-15-SP1-2021-2427,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2427,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2427,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2427,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2427,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2427,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2427,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2427,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2427,SUSE-Storage-6-2021-2427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2427-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2427-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2427-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1181193",
"url": "https://bugzilla.suse.com/1181193"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:29:05Z",
"generator": {
"date": "2021-07-21T09:29:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2427-1",
"initial_release_date": "2021-07-21T09:29:05Z",
"revision_history": [
{
"date": "2021-07-21T09:29:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.99.1.noarch",
"product_id": "kernel-devel-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.99.1.noarch",
"product_id": "kernel-docs-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.99.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.99.1.noarch",
"product_id": "kernel-macros-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.99.1.noarch",
"product_id": "kernel-source-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.99.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.99.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.s390x",
"product_id": "kernel-syms-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2542-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_49 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2542,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2541,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2542,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2543,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2542-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2542-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212542-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2542-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-07-28T07:05:43Z",
"generator": {
"date": "2021-07-28T07:05:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2542-1",
"initial_release_date": "2021-07-28T07:05:43Z",
"revision_history": [
{
"date": "2021-07-28T07:05:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-preempt-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-preempt-9-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_43-preempt-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-28T07:05:43Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-28T07:05:43Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-28T07:05:43Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2422-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610 bnc#1186463).\n- CVE-2021-34693: net/can/bcm.c allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n\nThe following non-security bugs were fixed:\n\n- block: do not use blocking queue entered for recursive bio (bsc#1104967).\n- s390/stack: fix possible register corruption with stack switch helper (git-fixes).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2422,SUSE-OpenStack-Cloud-9-2021-2422,SUSE-OpenStack-Cloud-Crowbar-9-2021-2422,SUSE-SLE-HA-12-SP4-2021-2422,SUSE-SLE-Live-Patching-12-SP4-2021-2422,SUSE-SLE-SAP-12-SP4-2021-2422,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2422",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2422-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2422-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2422-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html"
},
{
"category": "self",
"summary": "SUSE Bug 1104967",
"url": "https://bugzilla.suse.com/1104967"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:02:38Z",
"generator": {
"date": "2021-07-21T09:02:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2422-1",
"initial_release_date": "2021-07-21T09:02:38Z",
"revision_history": [
{
"date": "2021-07-21T09:02:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.80.1.noarch",
"product_id": "kernel-devel-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.80.1.noarch",
"product_id": "kernel-docs-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.80.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.80.1.noarch",
"product_id": "kernel-macros-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.80.1.noarch",
"product_id": "kernel-source-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.80.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.s390x",
"product_id": "kernel-syms-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.80.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2409-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges (bsc#1188062).\n\nThe following non-security bugs were fixed:\n\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2409,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2409",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2409-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2409-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212409-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2409-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:51Z",
"generator": {
"date": "2021-07-20T12:40:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2409-1",
"initial_release_date": "2021-07-20T12:40:51Z",
"revision_history": [
{
"date": "2021-07-20T12:40:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.14.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:51Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.14.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.14.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:51Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2416-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n\nThe following non-security bugs were fixed:\n\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- cxgb4: fix wrong shift (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\u003e\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2416,SUSE-SLE-HA-12-SP5-2021-2416,SUSE-SLE-Live-Patching-12-SP5-2021-2416,SUSE-SLE-SDK-12-SP5-2021-2416,SUSE-SLE-SERVER-12-SP5-2021-2416,SUSE-SLE-WE-12-SP5-2021-2416",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2416-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2416-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212416-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2416-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1185995",
"url": "https://bugzilla.suse.com/1185995"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188273",
"url": "https://bugzilla.suse.com/1188273"
},
{
"category": "self",
"summary": "SUSE Bug 1188274",
"url": "https://bugzilla.suse.com/1188274"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T14:13:25Z",
"generator": {
"date": "2021-07-20T14:13:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2416-1",
"initial_release_date": "2021-07-20T14:13:25Z",
"revision_history": [
{
"date": "2021-07-20T14:13:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.80.1.noarch",
"product_id": "kernel-devel-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.80.1.noarch",
"product_id": "kernel-docs-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.80.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.80.1.noarch",
"product_id": "kernel-macros-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.80.1.noarch",
"product_id": "kernel-source-4.12.14-122.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.80.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.80.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.80.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.s390x",
"product_id": "kernel-syms-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.80.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.80.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.80.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.80.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.80.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.80.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_80-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.80.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.80.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T14:13:25Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2408-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges (bsc#1188062).\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation (bsc#1187215).\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2021-35039: Fixed a bug where modules signature verification did not occur if CONFIG_MODULE_SIG is not set, regardless of the value of module.sig_enforce command-line argument. (bnc#1188080)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).\n- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).\n- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).\n- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).\n- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)\n- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in \u0027mtk_btcvsd_snd_probe()\u0027 (git-fixes).\n- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).\n- ath10k: remove unused more_frags variable (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- backlight: lm3630a_bl: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- Blacklist already cherry-picked ASoC commits\n- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).\n- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).\n- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).\n- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).\n- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).\n- clk: zynqmp: pll: Remove some dead code (git-fixes).\n- clocksource: Retry clock read if long delays detected (git-fixes).\n- cpufreq: sc520_freq: add \u0027fallthrough\u0027 to one case (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).\n- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).\n- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).\n- crypto: qat - remove unused macro in FW loader (git-fixes).\n- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).\n- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).\n- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).\n- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).\n- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).\n- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).\n- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)\n- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)\n- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)\n- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).\n- drm/msm: Small msm_gem_purge() fix (bsc#1152489)\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).\n- drm/rockchip: dsi: remove extra component_del() call (git-fixes).\n- drm/stm: Fix bus_flags handling (bsc#1152472)\n- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)\n- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).\n- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).\n- fm10k: Fix an error handling path in \u0027fm10k_probe()\u0027 (git-fixes).\n- fpga: machxo2-spi: Address warning about unused variable (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188267).\n- fuse: ignore PG_workingset after stealing (bsc#1188268).\n- fuse: reject internal errno (bsc#1188269).\n- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (git-fixes).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- HID: do not use down_interruptible() when unbinding devices (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).\n- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).\n- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).\n- i2c: dev: Add __user annotation (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use \u0027skb_frag_address()\u0027 instead of hand coding it (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).\n- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis16400: do not return ints in irq handlers (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).\n- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: si1133: fix format string warnings (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- kABI: restore struct tcpc_config definition (git-fixes).\n- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).\n- kernel-binary.spec: Fix up usrmerge for non-modular kernels.\n- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel\n- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: lm3532: select regmap I2C API (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).\n- mac80211_hwsim: drop pending frames on stop (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- math: Export mul_u64_u64_div_u64 (git-fixes).\n- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: Fix Media Controller API config checks (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).\n- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).\n- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: mtk-vcodec: fix PM runtime get logic (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rc: i2c: Fix an error message (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).\n- media: sti: fix obj-$(config) targets (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).\n- memstick: rtsx_usb_ms: fix UAF (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).\n- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).\n- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).\n- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).\n- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).\n- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).\n- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).\n- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- rpm/kernel-binary.spec.in: Remove zdebug define used only once.\n- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).\n- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).\n- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).\n- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).\n- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- serial: tegra-tcu: Reorder channel initialization (git-fixes).\n- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).\n- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).\n- soundwire: stream: Fix test for DP prepare complete (git-fixes).\n- spi: fspi: dynamically alloc AHB memory (bsc#1188121).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).\n- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).\n- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).\n- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).\n- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: Fix error return code in ssb_bus_scan() (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).\n- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).\n- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).\n- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).\n- tracing/histograms: Fix parsing of \u0027sym-offset\u0027 modifier (git-fixes).\n- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).\n- tracing: Simplify and fix saved_tgids logic (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).\n- usb: dwc3: Fix debugfs creation flow (git-fixes).\n- usb: gadget: eem: fix echo command packet response issue (git-fixes).\n- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).\n- usb: typec: fusb302: fix \u0027op-sink-microwatt\u0027 default that was in mW (git-fixes).\n- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).\n- usb: typec: tcpm: Move mod_delayed_work(port-\u003evdm_state_machine) call into tcpm_queue_vdm() (git-fixes).\n- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).\n- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).\n- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).\n- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).\n- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).\n- usb: typec: ucsi: Hold con-\u003elock for the entire duration of ucsi_register_port() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).\n- UsrMerge the kernel (boo#1184804)\n- vfio/pci: Handle concurrent vma faults (git-fixes).\n- vfs: Convert functionfs to use the new mount API (git -fixes).\n- video: fbdev: imxfb: Fix an error message (git-fixes).\n- visorbus: fix error return code in visorchipset_init() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).\n- xhci: solve a double free problem while doing s4 (git-fixes).\n- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2408,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2408",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2408-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2408-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212408-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2408-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1188036",
"url": "https://bugzilla.suse.com/1188036"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188080",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188121",
"url": "https://bugzilla.suse.com/1188121"
},
{
"category": "self",
"summary": "SUSE Bug 1188176",
"url": "https://bugzilla.suse.com/1188176"
},
{
"category": "self",
"summary": "SUSE Bug 1188267",
"url": "https://bugzilla.suse.com/1188267"
},
{
"category": "self",
"summary": "SUSE Bug 1188268",
"url": "https://bugzilla.suse.com/1188268"
},
{
"category": "self",
"summary": "SUSE Bug 1188269",
"url": "https://bugzilla.suse.com/1188269"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35039 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:34Z",
"generator": {
"date": "2021-07-20T12:40:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2408-1",
"initial_release_date": "2021-07-20T12:40:34Z",
"revision_history": [
{
"date": "2021-07-20T12:40:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-18.58.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-18.58.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-18.58.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-18.58.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-18.58.1.noarch",
"product_id": "kernel-source-azure-5.3.18-18.58.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-18.58.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-18.58.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-18.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-18.58.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-18.58.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-18.58.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-18.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-18.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-18.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-18.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-18.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-18.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-18.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-18.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-18.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-18.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-35039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35039"
}
],
"notes": [
{
"category": "general",
"text": "kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35039",
"url": "https://www.suse.com/security/cve/CVE-2021-35039"
},
{
"category": "external",
"summary": "SUSE Bug 1188080 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188080"
},
{
"category": "external",
"summary": "SUSE Bug 1188126 for CVE-2021-35039",
"url": "https://bugzilla.suse.com/1188126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "important"
}
],
"title": "CVE-2021-35039"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:34Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
}
]
}
suse-su-2021:2451-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).\n- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).\n- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).\n- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).\n- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).\n- hv_netvsc: common detach logic (bsc#1175462).\n- hv_netvsc: delay setup of VF device (bsc#1175462).\n- hv_netvsc: disable NAPI before channel close (bsc#1175462).\n- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).\n- hv_netvsc: fix deadlock on hotplug (bsc#1175462).\n- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).\n- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).\n- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).\n- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).\n- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).\n- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).\n- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).\n- hv_netvsc: fix race during initialization (bsc#1175462).\n- hv_netvsc: fix race on sub channel creation (bsc#1175462).\n- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).\n- hv_netvsc: fix schedule in RCU context (bsc#1175462).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).\n- hv_netvsc: flag software created hash value (bsc#1175462).\n- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).\n- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).\n- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).\n- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).\n- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).\n- hv_netvsc: set master device (bsc#1175462).\n- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).\n- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).\n- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).\n- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).\n- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).\n- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).\n- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).\n- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).\n- scsi: storvsc: Enable scatterlist entry lengths \u003e 4Kbytes (bsc#1187193).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-2451,SUSE-2021-2451,SUSE-OpenStack-Cloud-8-2021-2451,SUSE-OpenStack-Cloud-Crowbar-8-2021-2451,SUSE-SLE-HA-12-SP3-2021-2451,SUSE-SLE-SAP-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-BCL-2021-2451",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2451-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2451-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2451-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1115026",
"url": "https://bugzilla.suse.com/1115026"
},
{
"category": "self",
"summary": "SUSE Bug 1175462",
"url": "https://bugzilla.suse.com/1175462"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186235",
"url": "https://bugzilla.suse.com/1186235"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187193",
"url": "https://bugzilla.suse.com/1187193"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187388",
"url": "https://bugzilla.suse.com/1187388"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T11:16:06Z",
"generator": {
"date": "2021-07-22T11:16:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2451-1",
"initial_release_date": "2021-07-22T11:16:06Z",
"revision_history": [
{
"date": "2021-07-22T11:16:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product_id": "kernel-devel-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product_id": "kernel-macros-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.147.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product_id": "kernel-syms-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2577-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211)\n- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)\n- CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170)\n- CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593)\n- CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715)\n- CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646)\n- CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716)\n- CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2577,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2577",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2577-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2577-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2577-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-07-30T15:51:38Z",
"generator": {
"date": "2021-07-30T15:51:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2577-1",
"initial_release_date": "2021-07-30T15:51:38Z",
"revision_history": [
{
"date": "2021-07-30T15:51:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
}
]
}
suse-su-2021:2406-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2406,SUSE-SLE-SERVER-12-SP2-BCL-2021-2406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2406-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2406-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212406-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2406-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:03Z",
"generator": {
"date": "2021-07-20T12:40:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2406-1",
"initial_release_date": "2021-07-20T12:40:03Z",
"revision_history": [
{
"date": "2021-07-20T12:40:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product_id": "kernel-devel-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product_id": "kernel-macros-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.158.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product_id": "kernel-syms-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2538-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.180-94_127 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2538,SUSE-SLE-Live-Patching-12-SP4-2021-2529,SUSE-SLE-Live-Patching-12-SP4-2021-2530,SUSE-SLE-Live-Patching-12-SP4-2021-2531,SUSE-SLE-Live-Patching-12-SP4-2021-2532,SUSE-SLE-Live-Patching-12-SP4-2021-2533,SUSE-SLE-Live-Patching-12-SP4-2021-2534,SUSE-SLE-Live-Patching-12-SP5-2021-2515,SUSE-SLE-Live-Patching-12-SP5-2021-2516,SUSE-SLE-Live-Patching-12-SP5-2021-2517,SUSE-SLE-Live-Patching-12-SP5-2021-2518,SUSE-SLE-Live-Patching-12-SP5-2021-2519,SUSE-SLE-Live-Patching-12-SP5-2021-2520,SUSE-SLE-Live-Patching-12-SP5-2021-2521,SUSE-SLE-Live-Patching-12-SP5-2021-2522,SUSE-SLE-Live-Patching-12-SP5-2021-2523,SUSE-SLE-Live-Patching-12-SP5-2021-2524,SUSE-SLE-Live-Patching-12-SP5-2021-2525,SUSE-SLE-Live-Patching-12-SP5-2021-2526,SUSE-SLE-Live-Patching-12-SP5-2021-2527,SUSE-SLE-Live-Patching-12-SP5-2021-2528,SUSE-SLE-Module-Live-Patching-15-2021-2509,SUSE-SLE-Module-Live-Patching-15-2021-2510,SUSE-SLE-Module-Live-Patching-15-2021-2511,SUSE-SLE-Module-Live-Patching-15-2021-2512,SUSE-SLE-Module-Live-Patching-15-2021-2513,SUSE-SLE-Module-Live-Patching-15-2021-2514,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2500,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2501,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2502,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2503,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2504,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2505,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2506,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2507,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2508,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2488,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2489,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2490,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2491,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2492,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2493,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2494,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2495,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2496,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2497,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2498,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2499,SUSE-SLE-SAP-12-SP3-2021-2535,SUSE-SLE-SAP-12-SP3-2021-2536,SUSE-SLE-SAP-12-SP3-2021-2537,SUSE-SLE-SAP-12-SP3-2021-2538,SUSE-SLE-SAP-12-SP3-2021-2539,SUSE-SLE-SAP-12-SP3-2021-2540,SUSE-SLE-SERVER-12-SP3-2021-2535,SUSE-SLE-SERVER-12-SP3-2021-2536,SUSE-SLE-SERVER-12-SP3-2021-2537,SUSE-SLE-SERVER-12-SP3-2021-2538,SUSE-SLE-SERVER-12-SP3-2021-2539,SUSE-SLE-SERVER-12-SP3-2021-2540",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2538-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2538-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212538-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2538-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)",
"tracking": {
"current_release_date": "2021-07-27T15:37:16Z",
"generator": {
"date": "2021-07-27T15:37:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2538-1",
"initial_release_date": "2021-07-27T15:37:16Z",
"revision_history": [
{
"date": "2021-07-27T15:37:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"product_id": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:37:16Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:37:16Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-15-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-14-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-14-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-13-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-12-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-7-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_144-default-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-27T15:37:16Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
}
]
}
suse-su-2021:2643-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. (bsc#1176724).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038).\n- CVE-2021-22543: Fixed an improper handling of VM_IO|VM_PFNMAP vmas in KVM that allows users to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (bnc#1186482)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n\nThe following non-security bugs were fixed:\n\n- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).\n- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).\n- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).\n- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).\n- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).\n- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).\n- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).\n- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).\n- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).\n- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).\n- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).\n- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).\n- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).\n- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).\n- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).\n- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).\n- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).\n- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).\n- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).\n- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).\n- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).\n- Input: usbtouchscreen - fix control-request directions (git-fixes).\n- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- PCI: quirks: fix false kABI positive (git-fixes).\n- Revert \u0027ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro\u0027 (git-fixes).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027USB: cdc-acm: fix rounding error in TIOCSSERIAL\u0027 (git-fixes).\n- Revert \u0027hwmon: (lm80) fix a missing check of bus read in lm80 probe\u0027 (git-fixes).\n- Revert \u0027ibmvnic: remove duplicate napi_schedule call in open function\u0027 (bsc#1065729).\n- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).\n- USB: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).\n- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).\n- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).\n- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).\n- arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan (git-fixes).\n- arm_pmu: Fix write counter incorrect in ARMv7 big-endian mode (git-fixes).\n- ata: ahci_sunxi: Disable DIPM (git-fixes).\n- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).\n- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).\n- brcmfmac: correctly report average RSSI in station info (git-fixes).\n- brcmfmac: fix setting of station info chains bitmask (git-fixes).\n- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).\n- can: ems_usb: fix memory leak (git-fixes).\n- can: esd_usb2: fix memory leak (git-fixes).\n- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).\n- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).\n- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).\n- can: mcba_usb_start(): add missing urb-\u003etransfer_dma initialization (git-fixes).\n- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).\n- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb_8dev: fix memory leak (git-fixes).\n- ceph: do not WARN if we\u0027re still opening a session to an MDS (bsc#1188750).\n- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).\n- char: pcmcia: error out if \u0027num_bytes_read\u0027 is greater than 4 in set_protocol() (git-fixes).\n- cifs: Fix preauth hash corruption (git-fixes).\n- cifs: Return correct error code from smb2_get_enc_key (git-fixes).\n- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-\u003eprepath (git-fixes).\n- cifs: fix interrupted close commands (git-fixes).\n- cifs: fix memory leak in smb2_copychunk_range (git-fixes).\n- cosa: Add missing kfree in error path of cosa_write (git-fixes).\n- crypto: cavium/nitrox - Fix an error rhandling path in \u0027nitrox_probe()\u0027 (git-fixes).\n- crypto: do not free algorithm before using (git-fixes).\n- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).\n- cxgb4: fix wrong shift (git-fixes).\n- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).\n- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).\n- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).\n- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).\n- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).\n- drm/radeon: wait for moving fence after pinning (git-fixes).\n- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).\n- drm/virtio: Fix double free on probe failure (git-fixes).\n- drm: Return -ENOTTY for non-drm ioctls (git-fixes).\n- drm: qxl: ensure surf.data is ininitialized (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- extcon: max8997: Add missing modalias string (git-fixes).\n- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).\n- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).\n- fuse: check connected before queueing on fpq-\u003eio (bsc#1188273).\n- fuse: reject internal errno (bsc#1188274).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).\n- gve: Add DQO fields for core data structures (bsc#1176940).\n- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).\n- gve: Add NULL pointer checks when freeing irqs (bsc#1176940).\n- gve: Add basic driver framework for Compute Engine Virtual NIC (jsc#SLE-10538).\n- gve: Add dqo descriptors (bsc#1176940).\n- gve: Add ethtool support (jsc#SLE-10538).\n- gve: Add stats for gve (bsc#1176940).\n- gve: Add support for DQO RX PTYPE map (bsc#1176940).\n- gve: Add support for raw addressing device option (bsc#1176940).\n- gve: Add support for raw addressing in the tx path (bsc#1176940).\n- gve: Add support for raw addressing to the rx path (bsc#1176940).\n- gve: Add workqueue and reset support (jsc#SLE-10538).\n- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).\n- gve: Check TX QPL was actually assigned (bsc#1176940).\n- gve: Copy and paste bug in gve_get_stats() (jsc#SLE-10538).\n- gve: Correct SKB queue index validation (bsc#1176940).\n- gve: DQO: Add RX path (bsc#1176940).\n- gve: DQO: Add TX path (bsc#1176940).\n- gve: DQO: Add core netdev features (bsc#1176940).\n- gve: DQO: Add ring allocation and initialization (bsc#1176940).\n- gve: DQO: Configure interrupts on device up (bsc#1176940).\n- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).\n- gve: DQO: Remove incorrect prefetch (bsc#1176940).\n- gve: Enable Link Speed Reporting in the driver (bsc#1176940).\n- gve: Fix an error handling path in \u0027gve_probe()\u0027 (bsc#1176940).\n- gve: Fix case where desc_cnt and data_cnt can get out of sync (jsc#SLE-10538).\n- gve: Fix error return code in gve_alloc_qpls() (jsc#SLE-10538).\n- gve: Fix swapped vars when fetching max queues (git-fixes).\n- gve: Fix the queue page list allocated pages count (bsc#1176940).\n- gve: Fix u64_stats_sync to initialize start (jsc#SLE-10538).\n- gve: Fix warnings reported for DQO patchset (bsc#1176940).\n- gve: Fixes DMA synchronization (jsc#SLE-10538).\n- gve: Get and set Rx copybreak via ethtool (bsc#1176940).\n- gve: Introduce a new model for device options (bsc#1176940).\n- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).\n- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).\n- gve: Move some static functions to a common file (bsc#1176940).\n- gve: NIC stats for report-stats and for ethtool (bsc#1176940).\n- gve: Propagate error codes to caller (bsc#1176940).\n- gve: Remove the exporting of gve_probe (jsc#SLE-10538).\n- gve: Replace zero-length array with flexible-array member (bsc#1176940).\n- gve: Rx Buffer Recycling (bsc#1176940).\n- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).\n- gve: Update adminq commands to support DQO queues (bsc#1176940).\n- gve: Update mgmt_msix_idx if num_ntfy changes (bsc#1176940).\n- gve: Upgrade memory barrier in poll routine (bsc#1176940).\n- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).\n- gve: Use link status register to report link status (bsc#1176940).\n- gve: adminq: DQO specific device descriptor logic (bsc#1176940).\n- gve: fix -ENOMEM null check on a page allocation (jsc#SLE-10538).\n- gve: fix dma sync bug where not all pages synced (bsc#1176940).\n- gve: fix unused variable/label warnings (jsc#SLE-10538).\n- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).\n- gve: replace kfree with kvfree (jsc#SLE-10538).\n- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).\n- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).\n- i2c: robotfuzz-osif: fix control-request directions (git-fixes).\n- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).\n- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).\n- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).\n- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).\n- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).\n- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).\n- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).\n- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).\n- ibmvnic: set ltb-\u003ebuff to NULL after freeing (bsc#1094840 ltc#167098).\n- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: bma180: Use explicit member assignment (git-fixes).\n- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adis_buffer: do not return ints in irq handlers (git-fixes).\n- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).\n- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).\n- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).\n- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).\n- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).\n- kabi: fix nvme_wait_freeze_timeout() return type (bsc#1181161).\n- kfifo: DECLARE_KIFO_PTR(fifo, u64) does not work on arm 32 bit (git-fixes).\n- leds: ktd2692: Fix an error handling path (git-fixes).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).\n- lib/decompressors: remove set but not used variabled \u0027level\u0027 (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#1185032).\n- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).\n- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).\n- mac80211: remove warning in ieee80211_get_sband() (git-fixes).\n- media: I2C: change \u0027RST\u0027 to \u0027RSET\u0027 to fix multiple build errors (git-fixes).\n- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).\n- media: cobalt: fix race condition in setting HPD (git-fixes).\n- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).\n- media: dtv5100: fix control-request directions (git-fixes).\n- media: dvb-usb: fix wrong definition (git-fixes).\n- media: dvb_net: avoid speculation from net slot (git-fixes).\n- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).\n- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).\n- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).\n- media: gspca/gl860: fix zero-length control requests (git-fixes).\n- media: gspca/sq905: fix control-request direction (git-fixes).\n- media: gspca/sunplus: fix zero-length control requests (git-fixes).\n- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).\n- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: s5p-g2d: Fix a memory leak on ctx-\u003efh.m2m_ctx (git-fixes).\n- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).\n- media: siano: fix device register error path (git-fixes).\n- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).\n- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).\n- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).\n- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).\n- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).\n- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).\n- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).\n- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mmc: block: Disable CMDQ on the ioctl path (git-fixes).\n- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).\n- mmc: core: clear flags before allowing to retune (git-fixes).\n- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).\n- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).\n- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).\n- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).\n- mmc: vub3000: fix control-request direction (git-fixes).\n- mwifiex: re-fix for unaligned accesses (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: Google gve: Remove dma_wmb() before ringing doorbell (bsc#1176940).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: gve: convert strlcpy to strscpy (bsc#1176940).\n- net: gve: remove duplicated allowed (bsc#1176940).\n- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).\n- netsec: restore phy power state after controller reset (git-fixes).\n- nfc: nfcsim: fix use after free during module unload (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1181161).\n- nvme-multipath: fix double initialization of ANA state (bsc#1181161).\n- nvme-rdma: add clean action for failed reconnection (bsc#1181161).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1181161).\n- nvme-rdma: use cancel tagset helper for tear down (bsc#1181161).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1181161).\n- nvme: verify MNAN value if ANA is enabled (bsc#1185791).\n- nvmet: use new ana_log_size instead the old one (bsc#1181161).\n- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).\n- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: ab8500: Avoid NULL pointers (git-fixes).\n- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).\n- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).\n- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).\n- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).\n- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).\n- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries/scm: Use a specific endian format for storing uuid from the device tree (bsc#1113295, git-fixes).\n- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).\n- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).\n- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).\n- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).\n- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).\n- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).\n- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).\n- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).\n- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).\n- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).\n- pwm: spear: Do not modify HW state in .remove callback (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).\n- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).\n- reset: a10sr: add missing of_match_table reference (git-fixes).\n- reset: bail if try_module_get() fails (git-fixes).\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).\n- sched/cpufreq/schedutil: Fix error path mutex unlock (git-fixes)\n- sched/fair: Do not assign runtime for throttled cfs_rq (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- sched/numa: Fix a possible divide-by-zero (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).\n- scsi: mpt3sas: Fix kernel panic observed on soft HBA unplug (bsc#1185995).\n- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195).\n- serial: mvebu-uart: clarify the baud rate derivation (git-fixes).\n- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).\n- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).\n- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (git-fixes).\n- spi: Make of_register_spi_device also set the fwnode (git-fixes).\n- spi: mediatek: fix fifo rx mode (git-fixes).\n- spi: omap-100k: Fix the length judgment problem (git-fixes).\n- spi: spi-loopback-test: Fix \u0027tx_buf\u0027 might be \u0027rx_buf\u0027 (git-fixes).\n- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).\n- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).\n- spi: tegra114: Fix an error message (git-fixes).\n- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).\n- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).\n- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).\n- tracing: Do not reference char * as a string in histograms (git-fixes).\n- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).\n- tty: nozomi: Fix the error handling path of \u0027nozomi_card_init()\u0027 (git-fixes).\n- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).\n- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).\n- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).\n- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).\n- usb: max-3421: Prevent corruption of freed memory (git-fixes).\n- usb: move many drivers to use DEVICE_ATTR_WO (git-fixes).\n- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: vudc synchronize sysfs code paths (git-fixes).\n- usbip: vudc: fix missing unlock on error in usbip_sockfd_store() (git-fixes).\n- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).\n- virtio_console: Assure used length from device is limited (git-fixes).\n- w1: ds2438: fixing bug that would always get page0 (git-fixes).\n- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).\n- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).\n- watchdog: aspeed: fix hardware timeout calculation (git-fixes).\n- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).\n- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).\n- watchdog: sp805: Fix kernel doc description (git-fixes).\n- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).\n- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).\n- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).\n- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).\n- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).\n- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/kvm: Disable all PV features on crash (bsc#1185308).\n- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).\n- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).\n- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).\n- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n- xhci: Fix lost USB 2 remote wake (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2643,SUSE-SLE-RT-12-SP5-2021-2643",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2643-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2643-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2643-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1170511",
"url": "https://bugzilla.suse.com/1170511"
},
{
"category": "self",
"summary": "SUSE Bug 1176724",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "self",
"summary": "SUSE Bug 1176931",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1179195",
"url": "https://bugzilla.suse.com/1179195"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1184114",
"url": "https://bugzilla.suse.com/1184114"
},
{
"category": "self",
"summary": "SUSE Bug 1184350",
"url": "https://bugzilla.suse.com/1184350"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185032",
"url": "https://bugzilla.suse.com/1185032"
},
{
"category": "self",
"summary": "SUSE Bug 1185308",
"url": "https://bugzilla.suse.com/1185308"
},
{
"category": "self",
"summary": "SUSE Bug 1185377",
"url": "https://bugzilla.suse.com/1185377"
},
{
"category": "self",
"summary": "SUSE Bug 1185791",
"url": "https://bugzilla.suse.com/1185791"
},
{
"category": "self",
"summary": "SUSE Bug 1185995",
"url": "https://bugzilla.suse.com/1185995"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186482",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187476",
"url": "https://bugzilla.suse.com/1187476"
},
{
"category": "self",
"summary": "SUSE Bug 1187585",
"url": "https://bugzilla.suse.com/1187585"
},
{
"category": "self",
"summary": "SUSE Bug 1187846",
"url": "https://bugzilla.suse.com/1187846"
},
{
"category": "self",
"summary": "SUSE Bug 1188026",
"url": "https://bugzilla.suse.com/1188026"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188101",
"url": "https://bugzilla.suse.com/1188101"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE Bug 1188273",
"url": "https://bugzilla.suse.com/1188273"
},
{
"category": "self",
"summary": "SUSE Bug 1188274",
"url": "https://bugzilla.suse.com/1188274"
},
{
"category": "self",
"summary": "SUSE Bug 1188405",
"url": "https://bugzilla.suse.com/1188405"
},
{
"category": "self",
"summary": "SUSE Bug 1188620",
"url": "https://bugzilla.suse.com/1188620"
},
{
"category": "self",
"summary": "SUSE Bug 1188750",
"url": "https://bugzilla.suse.com/1188750"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188842",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1188973",
"url": "https://bugzilla.suse.com/1188973"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0429 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22543 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-08-10T08:03:06Z",
"generator": {
"date": "2021-08-10T08:03:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2643-1",
"initial_release_date": "2021-08-10T08:03:06Z",
"revision_history": [
{
"date": "2021-08-10T08:03:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.54.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.54.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.54.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.54.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.54.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.54.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.54.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.54.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.54.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.54.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.54.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0429"
}
],
"notes": [
{
"category": "general",
"text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0429",
"url": "https://www.suse.com/security/cve/CVE-2020-0429"
},
{
"category": "external",
"summary": "SUSE Bug 1176724 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "external",
"summary": "SUSE Bug 1176931 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "external",
"summary": "SUSE Bug 1188026 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1188026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-0429"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-22543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22543"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22543",
"url": "https://www.suse.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "SUSE Bug 1186482 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "external",
"summary": "SUSE Bug 1186483 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1197660 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1197660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3612"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3612",
"url": "https://www.suse.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "SUSE Bug 1187585 for CVE-2021-3612",
"url": "https://bugzilla.suse.com/1187585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "low"
}
],
"title": "CVE-2021-3612"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.54.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.54.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T08:03:06Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
}
]
}
WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
wid-sec-w-2023-0063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Juniper Security Advisory vom 2022-01-12",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-01-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:07.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0063",
"initial_release_date": "2022-01-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 21.3R1",
"product": {
"name": "Juniper Junos Space \u003c 21.3R1",
"product_id": "T021576",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:21.3r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-20934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-20934"
},
{
"cve": "CVE-2020-0543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-0549",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0549"
},
{
"cve": "CVE-2020-11022",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11023"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-29443",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-29443"
},
{
"cve": "CVE-2020-8625",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8695",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-20254",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-20254"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-2341",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2369",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2388",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2388"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25214",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25217",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25217"
},
{
"cve": "CVE-2021-27219",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-27219"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3653",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37576",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-42550",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-42550"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-45046",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-45046"
}
]
}
WID-SEC-W-2023-0063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Juniper Security Advisory vom 2022-01-12",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-01-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:07.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0063",
"initial_release_date": "2022-01-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 21.3R1",
"product": {
"name": "Juniper Junos Space \u003c 21.3R1",
"product_id": "T021576",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:21.3r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-20934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-20934"
},
{
"cve": "CVE-2020-0543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-0549",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0549"
},
{
"cve": "CVE-2020-11022",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11023"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-29443",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-29443"
},
{
"cve": "CVE-2020-8625",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8695",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-20254",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-20254"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-2341",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2369",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2388",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2388"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25214",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25217",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25217"
},
{
"cve": "CVE-2021-27219",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-27219"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3653",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37576",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-42550",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-42550"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-45046",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-45046"
}
]
}
SSA-770721
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SIMATIC RF160B contain multiple vulnerabilities of different types that could allow an attacker to execute arbitrary code within the context of a privileged process.\n\nSiemens has released a new version for SIMATIC RF160B and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
},
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770721.json"
},
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770721.pdf"
},
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-770721.txt"
}
],
"title": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2",
"tracking": {
"current_release_date": "2024-03-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-770721",
"initial_release_date": "2024-03-12T00:00:00Z",
"revision_history": [
{
"date": "2024-03-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.2",
"product": {
"name": "SIMATIC RF160B (6GT2003-0FA00)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GT2003-0FA00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF160B (6GT2003-0FA00)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14491",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2017-14491"
},
{
"cve": "CVE-2017-18509",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2020-0338",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-123700107",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-0338"
},
{
"cve": "CVE-2020-0417",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-154319182",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-0417"
},
{
"cve": "CVE-2020-10768",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-11301",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-11301"
},
{
"cve": "CVE-2020-14305",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u2019s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-14305"
},
{
"cve": "CVE-2020-14381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-14381"
},
{
"cve": "CVE-2020-15436",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-15436"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-25705",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-25705"
},
{
"cve": "CVE-2020-26555",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-26555"
},
{
"cve": "CVE-2020-26558",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2021-0302",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0302"
},
{
"cve": "CVE-2021-0305",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0305"
},
{
"cve": "CVE-2021-0325",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0325"
},
{
"cve": "CVE-2021-0326",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0326"
},
{
"cve": "CVE-2021-0327",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0327"
},
{
"cve": "CVE-2021-0328",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0328"
},
{
"cve": "CVE-2021-0329",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0329"
},
{
"cve": "CVE-2021-0330",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0330"
},
{
"cve": "CVE-2021-0331",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0331"
},
{
"cve": "CVE-2021-0333",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0333"
},
{
"cve": "CVE-2021-0334",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0334"
},
{
"cve": "CVE-2021-0336",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0336"
},
{
"cve": "CVE-2021-0337",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0337"
},
{
"cve": "CVE-2021-0339",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0339"
},
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0341"
},
{
"cve": "CVE-2021-0390",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0390"
},
{
"cve": "CVE-2021-0391",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0391"
},
{
"cve": "CVE-2021-0392",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0392"
},
{
"cve": "CVE-2021-0393",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0393"
},
{
"cve": "CVE-2021-0394",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0394"
},
{
"cve": "CVE-2021-0396",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0396"
},
{
"cve": "CVE-2021-0397",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0397"
},
{
"cve": "CVE-2021-0399",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0399"
},
{
"cve": "CVE-2021-0400",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-177561690",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0400"
},
{
"cve": "CVE-2021-0429",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175074139",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0429"
},
{
"cve": "CVE-2021-0431",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174149901",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0431"
},
{
"cve": "CVE-2021-0433",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0433"
},
{
"cve": "CVE-2021-0434",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, there is a possible phishing attack allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-167403112",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0434"
},
{
"cve": "CVE-2021-0435",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174150451",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0435"
},
{
"cve": "CVE-2021-0436",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0436"
},
{
"cve": "CVE-2021-0437",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176168330",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0437"
},
{
"cve": "CVE-2021-0438",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-152064592",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0438"
},
{
"cve": "CVE-2021-0443",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-170474245",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0443"
},
{
"cve": "CVE-2021-0444",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-178825358",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0444"
},
{
"cve": "CVE-2021-0471",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444786",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0471"
},
{
"cve": "CVE-2021-0473",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179687208",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0473"
},
{
"cve": "CVE-2021-0474",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0474"
},
{
"cve": "CVE-2021-0476",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-169252501",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0476"
},
{
"cve": "CVE-2021-0478",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0478"
},
{
"cve": "CVE-2021-0480",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-174493336",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0480"
},
{
"cve": "CVE-2021-0481",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-172939189",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0481"
},
{
"cve": "CVE-2021-0484",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-173720767",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0484"
},
{
"cve": "CVE-2021-0506",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0506"
},
{
"cve": "CVE-2021-0507",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181860042",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0507"
},
{
"cve": "CVE-2021-0508",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0508"
},
{
"cve": "CVE-2021-0509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0509"
},
{
"cve": "CVE-2021-0510",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0510"
},
{
"cve": "CVE-2021-0511",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0511"
},
{
"cve": "CVE-2021-0512",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0513",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-156090809",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0513"
},
{
"cve": "CVE-2021-0514",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9 Android-11 Android-8.1Android ID: A-162604069",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0514"
},
{
"cve": "CVE-2021-0515",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-167389063",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0515"
},
{
"cve": "CVE-2021-0516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0516"
},
{
"cve": "CVE-2021-0519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0519"
},
{
"cve": "CVE-2021-0520",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-176237595",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0520"
},
{
"cve": "CVE-2021-0521",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174661955",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0521"
},
{
"cve": "CVE-2021-0522",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0522"
},
{
"cve": "CVE-2021-0584",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In verifyBufferObject of Parcel.cpp, there is a possible out of bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-179289794",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0584"
},
{
"cve": "CVE-2021-0585",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-184963385",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0585"
},
{
"cve": "CVE-2021-0586",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-182584940",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0586"
},
{
"cve": "CVE-2021-0587",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185259758",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0587"
},
{
"cve": "CVE-2021-0588",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-177238342",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0588"
},
{
"cve": "CVE-2021-0589",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0589"
},
{
"cve": "CVE-2021-0591",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0591"
},
{
"cve": "CVE-2021-0593",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179386068",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0593"
},
{
"cve": "CVE-2021-0594",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0594"
},
{
"cve": "CVE-2021-0596",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181346550",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0596"
},
{
"cve": "CVE-2021-0597",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496502",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0597"
},
{
"cve": "CVE-2021-0598",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0598"
},
{
"cve": "CVE-2021-0599",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175614289",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0599"
},
{
"cve": "CVE-2021-0600",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-179042963",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0600"
},
{
"cve": "CVE-2021-0601",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0601"
},
{
"cve": "CVE-2021-0604",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179910660",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0604"
},
{
"cve": "CVE-2021-0640",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0640"
},
{
"cve": "CVE-2021-0641",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0641"
},
{
"cve": "CVE-2021-0642",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0642"
},
{
"cve": "CVE-2021-0646",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0646"
},
{
"cve": "CVE-2021-0650",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-190286685",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0650"
},
{
"cve": "CVE-2021-0651",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0651"
},
{
"cve": "CVE-2021-0652",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0652"
},
{
"cve": "CVE-2021-0653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-177931370",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0653"
},
{
"cve": "CVE-2021-0682",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0682"
},
{
"cve": "CVE-2021-0683",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0683"
},
{
"cve": "CVE-2021-0684",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0684"
},
{
"cve": "CVE-2021-0687",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0687"
},
{
"cve": "CVE-2021-0688",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0688"
},
{
"cve": "CVE-2021-0689",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0689"
},
{
"cve": "CVE-2021-0690",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0690"
},
{
"cve": "CVE-2021-0692",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0692"
},
{
"cve": "CVE-2021-0695",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0695"
},
{
"cve": "CVE-2021-0704",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-179338675",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0704"
},
{
"cve": "CVE-2021-0706",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-193444889",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0706"
},
{
"cve": "CVE-2021-0708",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In runDumpHeap of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-183262161",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0708"
},
{
"cve": "CVE-2021-0870",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0870"
},
{
"cve": "CVE-2021-0919",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-197336441",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0919"
},
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0920"
},
{
"cve": "CVE-2021-0926",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-191053931",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0926"
},
{
"cve": "CVE-2021-0928",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0928"
},
{
"cve": "CVE-2021-0929",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0929"
},
{
"cve": "CVE-2021-0930",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-181660091",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0930"
},
{
"cve": "CVE-2021-0931",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-180747689",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0931"
},
{
"cve": "CVE-2021-0933",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-172251622",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0933"
},
{
"cve": "CVE-2021-0952",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-195748381",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0952"
},
{
"cve": "CVE-2021-0953",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0953"
},
{
"cve": "CVE-2021-0961",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0961"
},
{
"cve": "CVE-2021-0963",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0963"
},
{
"cve": "CVE-2021-0964",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "summary",
"text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-193363621",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0964"
},
{
"cve": "CVE-2021-0965",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194300867",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0965"
},
{
"cve": "CVE-2021-0967",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In vorbis_book_decodev_set of codebook.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199065614",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0967"
},
{
"cve": "CVE-2021-0968",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0968"
},
{
"cve": "CVE-2021-0970",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0970"
},
{
"cve": "CVE-2021-1972",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-1972"
},
{
"cve": "CVE-2021-1976",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-1976"
},
{
"cve": "CVE-2021-29647",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-38204",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-39621",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39621"
},
{
"cve": "CVE-2021-39623",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39623"
},
{
"cve": "CVE-2021-39626",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39626"
},
{
"cve": "CVE-2021-39627",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39627"
},
{
"cve": "CVE-2021-39629",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197353344",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39629"
},
{
"cve": "CVE-2021-39633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150694665References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39633"
},
{
"cve": "CVE-2021-39634",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39634"
},
{
"cve": "CVE-2022-20127",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221862119",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20127"
},
{
"cve": "CVE-2022-20130",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20130"
},
{
"cve": "CVE-2022-20227",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20227"
},
{
"cve": "CVE-2022-20229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20229"
},
{
"cve": "CVE-2022-20355",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219498290",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20355"
},
{
"cve": "CVE-2022-20411",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20411"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20423",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20423"
},
{
"cve": "CVE-2022-20462",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20462"
},
{
"cve": "CVE-2022-20466",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "summary",
"text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-179725730",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20466"
},
{
"cve": "CVE-2022-20468",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-228450451",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20468"
},
{
"cve": "CVE-2022-20469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230867224",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20469"
},
{
"cve": "CVE-2022-20472",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239210579",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20472"
},
{
"cve": "CVE-2022-20473",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20473"
},
{
"cve": "CVE-2022-20476",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-240936919",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20476"
},
{
"cve": "CVE-2022-20483",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20483"
},
{
"cve": "CVE-2022-20498",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246465319",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20498"
},
{
"cve": "CVE-2022-20500",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246540168",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20500"
}
]
}
ssa-770721
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SIMATIC RF160B contain multiple vulnerabilities of different types that could allow an attacker to execute arbitrary code within the context of a privileged process.\n\nSiemens has released a new version for SIMATIC RF160B and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
},
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770721.json"
},
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770721.pdf"
},
{
"category": "self",
"summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-770721.txt"
}
],
"title": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2",
"tracking": {
"current_release_date": "2024-03-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-770721",
"initial_release_date": "2024-03-12T00:00:00Z",
"revision_history": [
{
"date": "2024-03-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.2",
"product": {
"name": "SIMATIC RF160B (6GT2003-0FA00)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GT2003-0FA00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF160B (6GT2003-0FA00)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14491",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2017-14491"
},
{
"cve": "CVE-2017-18509",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2020-0338",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-123700107",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-0338"
},
{
"cve": "CVE-2020-0417",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-154319182",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-0417"
},
{
"cve": "CVE-2020-10768",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-11301",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-11301"
},
{
"cve": "CVE-2020-14305",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u2019s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-14305"
},
{
"cve": "CVE-2020-14381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-14381"
},
{
"cve": "CVE-2020-15436",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-15436"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-25705",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-25705"
},
{
"cve": "CVE-2020-26555",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-26555"
},
{
"cve": "CVE-2020-26558",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2021-0302",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0302"
},
{
"cve": "CVE-2021-0305",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0305"
},
{
"cve": "CVE-2021-0325",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0325"
},
{
"cve": "CVE-2021-0326",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0326"
},
{
"cve": "CVE-2021-0327",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0327"
},
{
"cve": "CVE-2021-0328",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0328"
},
{
"cve": "CVE-2021-0329",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0329"
},
{
"cve": "CVE-2021-0330",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0330"
},
{
"cve": "CVE-2021-0331",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0331"
},
{
"cve": "CVE-2021-0333",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0333"
},
{
"cve": "CVE-2021-0334",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0334"
},
{
"cve": "CVE-2021-0336",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0336"
},
{
"cve": "CVE-2021-0337",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0337"
},
{
"cve": "CVE-2021-0339",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0339"
},
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0341"
},
{
"cve": "CVE-2021-0390",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0390"
},
{
"cve": "CVE-2021-0391",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0391"
},
{
"cve": "CVE-2021-0392",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0392"
},
{
"cve": "CVE-2021-0393",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0393"
},
{
"cve": "CVE-2021-0394",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0394"
},
{
"cve": "CVE-2021-0396",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0396"
},
{
"cve": "CVE-2021-0397",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0397"
},
{
"cve": "CVE-2021-0399",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0399"
},
{
"cve": "CVE-2021-0400",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-177561690",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0400"
},
{
"cve": "CVE-2021-0429",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175074139",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0429"
},
{
"cve": "CVE-2021-0431",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174149901",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0431"
},
{
"cve": "CVE-2021-0433",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0433"
},
{
"cve": "CVE-2021-0434",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, there is a possible phishing attack allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-167403112",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0434"
},
{
"cve": "CVE-2021-0435",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174150451",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0435"
},
{
"cve": "CVE-2021-0436",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0436"
},
{
"cve": "CVE-2021-0437",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176168330",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0437"
},
{
"cve": "CVE-2021-0438",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-152064592",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0438"
},
{
"cve": "CVE-2021-0443",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-170474245",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0443"
},
{
"cve": "CVE-2021-0444",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-178825358",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0444"
},
{
"cve": "CVE-2021-0471",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444786",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0471"
},
{
"cve": "CVE-2021-0473",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179687208",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0473"
},
{
"cve": "CVE-2021-0474",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0474"
},
{
"cve": "CVE-2021-0476",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-169252501",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0476"
},
{
"cve": "CVE-2021-0478",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0478"
},
{
"cve": "CVE-2021-0480",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-174493336",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0480"
},
{
"cve": "CVE-2021-0481",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-172939189",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0481"
},
{
"cve": "CVE-2021-0484",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-173720767",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0484"
},
{
"cve": "CVE-2021-0506",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0506"
},
{
"cve": "CVE-2021-0507",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181860042",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0507"
},
{
"cve": "CVE-2021-0508",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0508"
},
{
"cve": "CVE-2021-0509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0509"
},
{
"cve": "CVE-2021-0510",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0510"
},
{
"cve": "CVE-2021-0511",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0511"
},
{
"cve": "CVE-2021-0512",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0513",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-156090809",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0513"
},
{
"cve": "CVE-2021-0514",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9 Android-11 Android-8.1Android ID: A-162604069",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0514"
},
{
"cve": "CVE-2021-0515",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-167389063",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0515"
},
{
"cve": "CVE-2021-0516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0516"
},
{
"cve": "CVE-2021-0519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0519"
},
{
"cve": "CVE-2021-0520",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-176237595",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0520"
},
{
"cve": "CVE-2021-0521",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174661955",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0521"
},
{
"cve": "CVE-2021-0522",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0522"
},
{
"cve": "CVE-2021-0584",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In verifyBufferObject of Parcel.cpp, there is a possible out of bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-179289794",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0584"
},
{
"cve": "CVE-2021-0585",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-184963385",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0585"
},
{
"cve": "CVE-2021-0586",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-182584940",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0586"
},
{
"cve": "CVE-2021-0587",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185259758",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0587"
},
{
"cve": "CVE-2021-0588",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-177238342",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0588"
},
{
"cve": "CVE-2021-0589",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0589"
},
{
"cve": "CVE-2021-0591",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0591"
},
{
"cve": "CVE-2021-0593",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179386068",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0593"
},
{
"cve": "CVE-2021-0594",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0594"
},
{
"cve": "CVE-2021-0596",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181346550",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0596"
},
{
"cve": "CVE-2021-0597",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496502",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0597"
},
{
"cve": "CVE-2021-0598",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0598"
},
{
"cve": "CVE-2021-0599",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175614289",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0599"
},
{
"cve": "CVE-2021-0600",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-179042963",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0600"
},
{
"cve": "CVE-2021-0601",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0601"
},
{
"cve": "CVE-2021-0604",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179910660",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0604"
},
{
"cve": "CVE-2021-0640",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0640"
},
{
"cve": "CVE-2021-0641",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0641"
},
{
"cve": "CVE-2021-0642",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0642"
},
{
"cve": "CVE-2021-0646",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0646"
},
{
"cve": "CVE-2021-0650",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-190286685",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0650"
},
{
"cve": "CVE-2021-0651",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0651"
},
{
"cve": "CVE-2021-0652",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0652"
},
{
"cve": "CVE-2021-0653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-177931370",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0653"
},
{
"cve": "CVE-2021-0682",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0682"
},
{
"cve": "CVE-2021-0683",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0683"
},
{
"cve": "CVE-2021-0684",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0684"
},
{
"cve": "CVE-2021-0687",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0687"
},
{
"cve": "CVE-2021-0688",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0688"
},
{
"cve": "CVE-2021-0689",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0689"
},
{
"cve": "CVE-2021-0690",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0690"
},
{
"cve": "CVE-2021-0692",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0692"
},
{
"cve": "CVE-2021-0695",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0695"
},
{
"cve": "CVE-2021-0704",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-179338675",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0704"
},
{
"cve": "CVE-2021-0706",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-193444889",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0706"
},
{
"cve": "CVE-2021-0708",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In runDumpHeap of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-183262161",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0708"
},
{
"cve": "CVE-2021-0870",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0870"
},
{
"cve": "CVE-2021-0919",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-197336441",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0919"
},
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0920"
},
{
"cve": "CVE-2021-0926",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-191053931",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0926"
},
{
"cve": "CVE-2021-0928",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0928"
},
{
"cve": "CVE-2021-0929",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0929"
},
{
"cve": "CVE-2021-0930",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-181660091",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0930"
},
{
"cve": "CVE-2021-0931",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-180747689",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0931"
},
{
"cve": "CVE-2021-0933",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-172251622",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0933"
},
{
"cve": "CVE-2021-0952",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-195748381",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0952"
},
{
"cve": "CVE-2021-0953",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0953"
},
{
"cve": "CVE-2021-0961",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0961"
},
{
"cve": "CVE-2021-0963",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0963"
},
{
"cve": "CVE-2021-0964",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "summary",
"text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-193363621",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0964"
},
{
"cve": "CVE-2021-0965",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194300867",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0965"
},
{
"cve": "CVE-2021-0967",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In vorbis_book_decodev_set of codebook.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199065614",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0967"
},
{
"cve": "CVE-2021-0968",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0968"
},
{
"cve": "CVE-2021-0970",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-0970"
},
{
"cve": "CVE-2021-1972",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-1972"
},
{
"cve": "CVE-2021-1976",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-1976"
},
{
"cve": "CVE-2021-29647",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-38204",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-39621",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39621"
},
{
"cve": "CVE-2021-39623",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39623"
},
{
"cve": "CVE-2021-39626",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39626"
},
{
"cve": "CVE-2021-39627",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39627"
},
{
"cve": "CVE-2021-39629",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197353344",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39629"
},
{
"cve": "CVE-2021-39633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150694665References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39633"
},
{
"cve": "CVE-2021-39634",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39634"
},
{
"cve": "CVE-2022-20127",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221862119",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20127"
},
{
"cve": "CVE-2022-20130",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20130"
},
{
"cve": "CVE-2022-20227",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20227"
},
{
"cve": "CVE-2022-20229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20229"
},
{
"cve": "CVE-2022-20355",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219498290",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20355"
},
{
"cve": "CVE-2022-20411",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20411"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20423",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20423"
},
{
"cve": "CVE-2022-20462",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20462"
},
{
"cve": "CVE-2022-20466",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "summary",
"text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-179725730",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20466"
},
{
"cve": "CVE-2022-20468",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-228450451",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20468"
},
{
"cve": "CVE-2022-20469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230867224",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20469"
},
{
"cve": "CVE-2022-20472",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239210579",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20472"
},
{
"cve": "CVE-2022-20473",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20473"
},
{
"cve": "CVE-2022-20476",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-240936919",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20476"
},
{
"cve": "CVE-2022-20483",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20483"
},
{
"cve": "CVE-2022-20498",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246465319",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20498"
},
{
"cve": "CVE-2022-20500",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246540168",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20500"
}
]
}
cnvd-2021-53926
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
| Name | Linux Linux kernel |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-33909"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e00\u4e2a\u8d8a\u754c\u5199\u5165\u7f3a\u9677\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-53926",
"openTime": "2021-07-23",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e00\u4e2a\u8d8a\u754c\u5199\u5165\u7f3a\u9677\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002 \u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2021-53926\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"serverity": "\u9ad8",
"submitTime": "2021-07-23",
"title": "Linux kernel\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2021-53926\uff09"
}
var-202107-1361
Vulnerability from variot
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary
Several security issues were fixed in the kernel. A local attacker could use this to possibly execute arbitrary code. (CVE-2021-3600)
It was discovered that the virtual file system implementation in the Linux kernel contained an unsigned to signed integer conversion error. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-33909)
Update instructions
The problem can be corrected by updating your kernel livepatch to the following versions:
Ubuntu 20.04 LTS gcp - 79.1 generic - 79.1 gke - 79.1 gkeop - 79.1 lowlatency - 79.1
Ubuntu 18.04 LTS generic - 79.1 gke - 79.1 gkeop - 79.1 lowlatency - 79.1 oem - 79.1
Ubuntu 16.04 ESM generic - 79.1 lowlatency - 79.1
Ubuntu 14.04 ESM generic - 79.1 lowlatency - 79.1
Support Information
Kernels older than the levels listed below do not receive livepatch updates. If you are running a kernel version earlier than the one listed below, please upgrade your kernel as soon as possible.
Ubuntu 20.04 LTS linux-aws - 5.4.0-1009 linux-azure - 5.4.0-1010 linux-gcp - 5.4.0-1009 linux-gke - 5.4.0-1033 linux-gkeop - 5.4.0-1009 linux-oem - 5.4.0-26 linux - 5.4.0-26
Ubuntu 18.04 LTS linux-aws - 4.15.0-1054 linux-gke-4.15 - 4.15.0-1076 linux-gke-5.4 - 5.4.0-1009 linux-gkeop-5.4 - 5.4.0-1007 linux-hwe-5.4 - 5.4.0-26 linux-oem - 4.15.0-1063 linux - 4.15.0-69
Ubuntu 16.04 ESM linux-aws - 4.4.0-1098 linux-azure - 4.15.0-1063 linux-azure - 4.15.0-1078 linux-hwe - 4.15.0-69 linux - 4.4.0-168
Ubuntu 14.04 ESM linux-lts-xenial - 4.4.0-168
References
- CVE-2021-3600
- CVE-2021-33909
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . 7.4) - noarch, x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
-
kernel-rt: update RT source tree to the latest RHEL-8.2.z10 Batch source tree (BZ#1968022)
-
8) - ppc64le, x86_64
-
Description:
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. 7.7) - ppc64, ppc64le, x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:2725-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2725 Issue date: 2021-07-20 CVE Names: CVE-2019-20934 CVE-2020-11668 CVE-2021-33033 CVE-2021-33034 CVE-2021-33909 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)
-
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)
-
kernel: use-after-free in show_numa_stats function (CVE-2019-20934)
-
kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)
-
kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
[RHEL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" (BZ#1872778)
-
[ESXi][RHEL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled (BZ#1892237)
-
[RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP (BZ#1910395)
-
False-positive hard lockup detected while processing the thread state information (SysRq-T) (BZ#1912221)
-
RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) (BZ#1917943)
-
The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console (BZ#1924688)
-
nvme hangs when trying to allocate reserved tag (BZ#1926825)
-
[REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors (BZ#1933663)
-
Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793)
-
sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! (BZ#1953052)
-
[Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed (BZ#1953075)
-
Kernel panic at cgroup_is_descendant (BZ#1957719)
-
[Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803)
-
IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339)
-
[CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1960193)
-
mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406)
-
incorrect assertion on pi_state->pi_mutex.wait_lock from pi_state_update_owner() (BZ#1965495)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c 1902788 - CVE-2019-20934 kernel: use-after-free in show_numa_stats function 1961300 - CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c 1961305 - CVE-2021-33034 kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-1160.36.2.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-1160.36.2.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-1160.36.2.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm
ppc64: bpftool-3.10.0-1160.36.2.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-3.10.0-1160.36.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.36.2.el7.ppc64.rpm kernel-devel-3.10.0-1160.36.2.el7.ppc64.rpm kernel-headers-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.ppc64.rpm perf-3.10.0-1160.36.2.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm python-perf-3.10.0-1160.36.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm
ppc64le: bpftool-3.10.0-1160.36.2.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-devel-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-headers-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.ppc64le.rpm perf-3.10.0-1160.36.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm python-perf-3.10.0-1160.36.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm
s390x: bpftool-3.10.0-1160.36.2.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-3.10.0-1160.36.2.el7.s390x.rpm kernel-debug-3.10.0-1160.36.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.36.2.el7.s390x.rpm kernel-devel-3.10.0-1160.36.2.el7.s390x.rpm kernel-headers-3.10.0-1160.36.2.el7.s390x.rpm kernel-kdump-3.10.0-1160.36.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.36.2.el7.s390x.rpm perf-3.10.0-1160.36.2.el7.s390x.rpm perf-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm python-perf-3.10.0-1160.36.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm
x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm
ppc64le: bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm
x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-1160.36.2.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-20934 https://access.redhat.com/security/cve/CVE-2020-11668 https://access.redhat.com/security/cve/CVE-2021-33033 https://access.redhat.com/security/cve/CVE-2021-33034 https://access.redhat.com/security/cve/CVE-2021-33909 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-006
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYPd0rdzjgjWX9erEAQgSLQ/9FYCaqS1w2FD8A64mwloIz/fRGh5eGMwl 6RgXKj6wOJPaSPYl3Gk4r7hEDx1aO8jwxz5uZ8PRz1K4LFArAGLi3BBc2pCk1QA1 SHPfNuKO8UefwGrqv7Xd6wThwwt+7D8LN2Lg+H2vUYve/NRrxQZOqH7MnQPKsVve ufvaDQjrySGSXkiQHSSDSvlDQB3eaVRCqh10cBwWzsU/lG/JcdvbIo4Oat27S8WU c4VijwACg7Wn7iTYkMMR4xk0iP991QeoYkqusJByGO5K9naZsSU8LxT4i84/mbZB RWJULDHKPHZtfpR+Gz6AOIl7aa8vE8V90263OUWPJG/c0O6u3sWzK5YyGr0Ob82l gbl1BnI+W0BanwMHeiBJq7HmgFU1jYO7vu5w4mnaf9gkDgm1GOBrHaBOHg/qEXWs WR4UDOpnJcZAxMpVJEyk8EolSv7AlcDKTr+J9xu9vKhdbmok0VbtGhjUDXEZI7tT 5FlrM1qfpa9S4EtiUv7hIYGFg78gVoLrXlPMxEyw9zXhYczCypNwbzWyH+O6utTG saiHuayf6WTw582qITDfgI9nenIu9a6rqEu1pg5EuwoqD5ipRVAsmaFBPWdi+exa +I2KV777KAXM2k4XqVbmVcZ1MnvTqCoEwFLy349A3r3Y9JwDJxCu73HU5nifg4LP AMB5i8YI9o8=gDcx -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202107-1361",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.20"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "5.5"
},
{
"model": "communications session border controller",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "9.0"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.5"
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "34"
},
{
"model": "solidfire",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "3.16"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.10"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"model": "communications session border controller",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.4"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "3.12.43"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.9.276"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.14.240"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "5.4.134"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "5.11"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "5.13"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "5.12.19"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "5.13.4"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.4.276"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.15"
},
{
"model": "hci management node",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "10.0"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "3.13"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "5.10.52"
},
{
"model": "communications session border controller",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.3"
},
{
"model": "communications session border controller",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "8.2"
},
{
"model": "sma1000",
"scope": "lte",
"trust": 1.0,
"vendor": "sonicwall",
"version": "12.4.2-02044"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.19.198"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "163577"
},
{
"db": "PACKETSTORM",
"id": "163580"
},
{
"db": "PACKETSTORM",
"id": "163583"
},
{
"db": "PACKETSTORM",
"id": "163584"
},
{
"db": "PACKETSTORM",
"id": "163603"
},
{
"db": "PACKETSTORM",
"id": "163606"
},
{
"db": "PACKETSTORM",
"id": "163607"
},
{
"db": "PACKETSTORM",
"id": "163608"
}
],
"trust": 0.8
},
"cve": "CVE-2021-33909",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2021-33909",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-33909",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-33909",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2021-33909",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-33909"
},
{
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. Linux kernel vulnerabilities\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 ESM\n- Ubuntu 14.04 ESM\n\nSummary\n\nSeveral security issues were fixed in the kernel. A local attacker could use this to\npossibly execute arbitrary code. (CVE-2021-3600)\n\nIt was discovered that the virtual file system implementation in the\nLinux kernel contained an unsigned to signed integer conversion error. \nA local attacker could use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2021-33909)\n\nUpdate instructions\n\nThe problem can be corrected by updating your kernel livepatch to the\nfollowing versions:\n\nUbuntu 20.04 LTS\n gcp - 79.1\n generic - 79.1\n gke - 79.1\n gkeop - 79.1\n lowlatency - 79.1\n\nUbuntu 18.04 LTS\n generic - 79.1\n gke - 79.1\n gkeop - 79.1\n lowlatency - 79.1\n oem - 79.1\n\nUbuntu 16.04 ESM\n generic - 79.1\n lowlatency - 79.1\n\nUbuntu 14.04 ESM\n generic - 79.1\n lowlatency - 79.1\n\nSupport Information\n\nKernels older than the levels listed below do not receive livepatch\nupdates. If you are running a kernel version earlier than the one\nlisted\nbelow, please upgrade your kernel as soon as possible. \n\nUbuntu 20.04 LTS\n linux-aws - 5.4.0-1009\n linux-azure - 5.4.0-1010\n linux-gcp - 5.4.0-1009\n linux-gke - 5.4.0-1033\n linux-gkeop - 5.4.0-1009\n linux-oem - 5.4.0-26\n linux - 5.4.0-26\n\nUbuntu 18.04 LTS\n linux-aws - 4.15.0-1054\n linux-gke-4.15 - 4.15.0-1076\n linux-gke-5.4 - 5.4.0-1009\n linux-gkeop-5.4 - 5.4.0-1007\n linux-hwe-5.4 - 5.4.0-26\n linux-oem - 4.15.0-1063\n linux - 4.15.0-69\n\nUbuntu 16.04 ESM\n linux-aws - 4.4.0-1098\n linux-azure - 4.15.0-1063\n linux-azure - 4.15.0-1078\n linux-hwe - 4.15.0-69\n linux - 4.4.0-168\n\nUbuntu 14.04 ESM\n linux-lts-xenial - 4.4.0-168\n\nReferences\n\n- CVE-2021-3600\n- CVE-2021-33909\n\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. 7.4) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z10 Batch source\ntree (BZ#1968022)\n\n4. 8) - ppc64le, x86_64\n\n3. Description:\n\nThis is a kernel live patch module which is automatically loaded by the RPM\npost-install script to modify the code of a running kernel. 7.7) - ppc64, ppc64le, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2021:2725-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2725\nIssue date: 2021-07-20\nCVE Names: CVE-2019-20934 CVE-2020-11668 CVE-2021-33033\n CVE-2021-33034 CVE-2021-33909\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer\n(CVE-2021-33909)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an\nhci_chan (CVE-2021-33034)\n\n* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)\n\n* kernel: mishandles invalid descriptors in\ndrivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c\n(CVE-2021-33033)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* [RHEL7.9.z] n_tty_open: \"BUG: unable to handle kernel paging request\"\n(BZ#1872778)\n\n* [ESXi][RHEL7.8]\"qp_alloc_hypercall result = -20\" / \"Could not attach to\nqueue pair with -20\" with vSphere Fault Tolerance enabled (BZ#1892237)\n\n* [RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD\nwith DIAG driver returns EOPNOTSUPP (BZ#1910395)\n\n* False-positive hard lockup detected while processing the thread state\ninformation (SysRq-T) (BZ#1912221)\n\n* RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or\nmore IFL (pci) (BZ#1917943)\n\n* The NMI watchdog detected a hard lockup while printing RCU CPU stall\nwarning messages to the serial console (BZ#1924688)\n\n* nvme hangs when trying to allocate reserved tag (BZ#1926825)\n\n* [REGRESSION] \"call into AER handling regardless of severity\" triggers\ndo_recovery() unnecessarily on correctable PCIe errors (BZ#1933663)\n\n* Module nvme_core: A double free of the kmalloc-512 cache between\nnvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793)\n\n* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at\nkernel/timer.c:1000! (BZ#1953052)\n\n* [Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit\n2a7f8c3b1d3fee is needed (BZ#1953075)\n\n* Kernel panic at cgroup_is_descendant (BZ#1957719)\n\n* [Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803)\n\n* IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap\n[7.9.z] (BZ#1960193)\n\n* mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406)\n\n* incorrect assertion on pi_state-\u003epi_mutex.wait_lock from\npi_state_update_owner() (BZ#1965495)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c\n1902788 - CVE-2019-20934 kernel: use-after-free in show_numa_stats function\n1961300 - CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c\n1961305 - CVE-2021-33034 kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan\n1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-1160.36.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm\nkernel-doc-3.10.0-1160.36.2.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.36.2.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-1160.36.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm\nkernel-doc-3.10.0-1160.36.2.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.36.2.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-1160.36.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm\nkernel-doc-3.10.0-1160.36.2.el7.noarch.rpm\n\nppc64:\nbpftool-3.10.0-1160.36.2.el7.ppc64.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debug-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-devel-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-headers-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-tools-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-1160.36.2.el7.ppc64.rpm\nperf-3.10.0-1160.36.2.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\npython-perf-3.10.0-1160.36.2.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\n\nppc64le:\nbpftool-3.10.0-1160.36.2.el7.ppc64le.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debug-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-devel-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-headers-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-tools-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-1160.36.2.el7.ppc64le.rpm\nperf-3.10.0-1160.36.2.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\npython-perf-3.10.0-1160.36.2.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\n\ns390x:\nbpftool-3.10.0-1160.36.2.el7.s390x.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-debug-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-devel-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-headers-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-kdump-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-1160.36.2.el7.s390x.rpm\nperf-3.10.0-1160.36.2.el7.s390x.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm\npython-perf-3.10.0-1160.36.2.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-1160.36.2.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nbpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-1160.36.2.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm\n\nppc64le:\nbpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-1160.36.2.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-1160.36.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm\nkernel-doc-3.10.0-1160.36.2.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.36.2.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-20934\nhttps://access.redhat.com/security/cve/CVE-2020-11668\nhttps://access.redhat.com/security/cve/CVE-2021-33033\nhttps://access.redhat.com/security/cve/CVE-2021-33034\nhttps://access.redhat.com/security/cve/CVE-2021-33909\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2021-006\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nAMB5i8YI9o8=gDcx\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-33909"
},
{
"db": "VULMON",
"id": "CVE-2021-33909"
},
{
"db": "PACKETSTORM",
"id": "163671"
},
{
"db": "PACKETSTORM",
"id": "163577"
},
{
"db": "PACKETSTORM",
"id": "163580"
},
{
"db": "PACKETSTORM",
"id": "163583"
},
{
"db": "PACKETSTORM",
"id": "163584"
},
{
"db": "PACKETSTORM",
"id": "163603"
},
{
"db": "PACKETSTORM",
"id": "163606"
},
{
"db": "PACKETSTORM",
"id": "163607"
},
{
"db": "PACKETSTORM",
"id": "163608"
}
],
"trust": 1.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-33909",
"trust": 2.0
},
{
"db": "PACKETSTORM",
"id": "163671",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/09/21/1",
"trust": 1.0
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/07/20/1",
"trust": 1.0
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/08/25/10",
"trust": 1.0
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/09/17/2",
"trust": 1.0
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/07/22/7",
"trust": 1.0
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/09/17/4",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "164155",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "163621",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "165477",
"trust": 1.0
},
{
"db": "VULMON",
"id": "CVE-2021-33909",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163577",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163580",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163583",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163584",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163603",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163606",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163607",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163608",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-33909"
},
{
"db": "PACKETSTORM",
"id": "163671"
},
{
"db": "PACKETSTORM",
"id": "163577"
},
{
"db": "PACKETSTORM",
"id": "163580"
},
{
"db": "PACKETSTORM",
"id": "163583"
},
{
"db": "PACKETSTORM",
"id": "163584"
},
{
"db": "PACKETSTORM",
"id": "163603"
},
{
"db": "PACKETSTORM",
"id": "163606"
},
{
"db": "PACKETSTORM",
"id": "163607"
},
{
"db": "PACKETSTORM",
"id": "163608"
},
{
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"id": "VAR-202107-1361",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.26739928
},
"last_update_date": "2024-11-29T19:58:47.190000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Amazon Linux AMI: ALAS-2021-1524",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1524"
},
{
"title": "Debian Security Advisories: DSA-4941-1 linux -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=fb9b5f5cc430f484f4420a11b7b87136"
},
{
"title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-055",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-055"
},
{
"title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-003",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.10-2022-003"
},
{
"title": "Amazon Linux 2: ALAS2-2021-1691",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1691"
},
{
"title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-057",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-057"
},
{
"title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-056",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-056"
},
{
"title": "Arch Linux Advisories: [ASA-202107-48] linux: privilege escalation",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-48"
},
{
"title": "Arch Linux Advisories: [ASA-202107-50] linux-hardened: privilege escalation",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-50"
},
{
"title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-005",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-005"
},
{
"title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-058",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-058"
},
{
"title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-059",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-059"
},
{
"title": "Arch Linux Advisories: [ASA-202107-49] linux-zen: privilege escalation",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-49"
},
{
"title": "Arch Linux Advisories: [ASA-202107-51] linux-lts: privilege escalation",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-51"
},
{
"title": "Arch Linux Issues: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-33909 log"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d"
},
{
"title": "LinuxVulnerabilities",
"trust": 0.1,
"url": "https://github.com/gitezri/LinuxVulnerabilities "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/Live-Hack-CVE/CVE-2021-33909 "
},
{
"title": "CVE-2021-33909",
"trust": 0.1,
"url": "https://github.com/AmIAHuman/CVE-2021-33909 "
},
{
"title": "CVE-2021-33909",
"trust": 0.1,
"url": "https://github.com/Liang2580/CVE-2021-33909 "
},
{
"title": "cve-2021-33909",
"trust": 0.1,
"url": "https://github.com/baerwolf/cve-2021-33909 "
},
{
"title": "CVE-2021-33909",
"trust": 0.1,
"url": "https://github.com/bbinfosec43/CVE-2021-33909 "
},
{
"title": "deep-directory",
"trust": 0.1,
"url": "https://github.com/sfowl/deep-directory "
},
{
"title": "integer_compilation_flags",
"trust": 0.1,
"url": "https://github.com/mdulin2/integer_compilation_flags "
},
{
"title": "CVE-2021-33909",
"trust": 0.1,
"url": "https://github.com/AlAIAL90/CVE-2021-33909 "
},
{
"title": "CVE-2021-33909",
"trust": 0.1,
"url": "https://github.com/ChrisTheCoolHut/CVE-2021-33909 "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/knewbury01/codeql-workshop-integer-conversion "
},
{
"title": "kickstart-rhel8",
"trust": 0.1,
"url": "https://github.com/alexhaydock/kickstart-rhel8 "
},
{
"title": "exploit_articles",
"trust": 0.1,
"url": "https://github.com/ChoKyuWon/exploit_articles "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/hardenedvault/ved "
},
{
"title": "SVG-advisories",
"trust": 0.1,
"url": "https://github.com/EGI-Federation/SVG-advisories "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/makoto56/penetration-suite-toolkit "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-33909"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "CWE-190",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/163621/sequoia-a-deep-root-in-linuxs-filesystem-layer.html"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/163671/kernel-live-patch-security-notice-lsn-0079-1.html"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/164155/kernel-live-patch-security-notice-lsn-0081-1.html"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/165477/kernel-live-patch-security-notice-lsn-0083-1.html"
},
{
"trust": 1.0,
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"trust": 1.0,
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"trust": 1.0,
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"trust": 1.0,
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"trust": 1.0,
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"trust": 1.0,
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.13.4"
},
{
"trust": 1.0,
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"trust": 1.0,
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"trust": 1.0,
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"trust": 1.0,
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"trust": 1.0,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/z4uhhigiso3fvrf4cqnjs4ika25atsfu/"
},
{
"trust": 1.0,
"url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0015"
},
{
"trust": 1.0,
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"trust": 1.0,
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"trust": 1.0,
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"trust": 1.0,
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33909"
},
{
"trust": 0.8,
"url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/cve/cve-2021-33909"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-006"
},
{
"trust": 0.8,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33034"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2021-33034"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-3347"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-20934"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-33033"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-11668"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-20934"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-11668"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33033"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3600"
},
{
"trust": 0.1,
"url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2733"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2732"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-28374"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-28374"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2730"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-35508"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25704"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26541"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35508"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26541"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25704"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2719"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-32399"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2716"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2728"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2726"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2725"
}
],
"sources": [
{
"db": "PACKETSTORM",
"id": "163671"
},
{
"db": "PACKETSTORM",
"id": "163577"
},
{
"db": "PACKETSTORM",
"id": "163580"
},
{
"db": "PACKETSTORM",
"id": "163583"
},
{
"db": "PACKETSTORM",
"id": "163584"
},
{
"db": "PACKETSTORM",
"id": "163603"
},
{
"db": "PACKETSTORM",
"id": "163606"
},
{
"db": "PACKETSTORM",
"id": "163607"
},
{
"db": "PACKETSTORM",
"id": "163608"
},
{
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2021-33909"
},
{
"db": "PACKETSTORM",
"id": "163671"
},
{
"db": "PACKETSTORM",
"id": "163577"
},
{
"db": "PACKETSTORM",
"id": "163580"
},
{
"db": "PACKETSTORM",
"id": "163583"
},
{
"db": "PACKETSTORM",
"id": "163584"
},
{
"db": "PACKETSTORM",
"id": "163603"
},
{
"db": "PACKETSTORM",
"id": "163606"
},
{
"db": "PACKETSTORM",
"id": "163607"
},
{
"db": "PACKETSTORM",
"id": "163608"
},
{
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-07-20T00:00:00",
"db": "VULMON",
"id": "CVE-2021-33909"
},
{
"date": "2021-07-26T15:52:13",
"db": "PACKETSTORM",
"id": "163671"
},
{
"date": "2021-07-21T16:01:56",
"db": "PACKETSTORM",
"id": "163577"
},
{
"date": "2021-07-21T16:02:21",
"db": "PACKETSTORM",
"id": "163580"
},
{
"date": "2021-07-21T16:02:44",
"db": "PACKETSTORM",
"id": "163583"
},
{
"date": "2021-07-21T16:02:50",
"db": "PACKETSTORM",
"id": "163584"
},
{
"date": "2021-07-21T16:05:14",
"db": "PACKETSTORM",
"id": "163603"
},
{
"date": "2021-07-21T16:05:35",
"db": "PACKETSTORM",
"id": "163606"
},
{
"date": "2021-07-21T16:05:44",
"db": "PACKETSTORM",
"id": "163607"
},
{
"date": "2021-07-21T16:06:02",
"db": "PACKETSTORM",
"id": "163608"
},
{
"date": "2021-07-20T19:15:09.747000",
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-11-07T00:00:00",
"db": "VULMON",
"id": "CVE-2021-33909"
},
{
"date": "2023-11-07T03:35:56.050000",
"db": "NVD",
"id": "CVE-2021-33909"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "PACKETSTORM",
"id": "163671"
}
],
"trust": 0.1
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kernel Live Patch Security Notice LSN-0079-1",
"sources": [
{
"db": "PACKETSTORM",
"id": "163671"
}
],
"trust": 0.1
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "arbitrary",
"sources": [
{
"db": "PACKETSTORM",
"id": "163671"
}
],
"trust": 0.1
}
}
msrc_cve-2021-33909
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33909 fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations leading to an integer overflow an Out-of-bounds Write and escalation to root by an unprivileged user aka CID-8cae8cd89f05. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-33909.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations leading to an integer overflow an Out-of-bounds Write and escalation to root by an unprivileged user aka CID-8cae8cd89f05.",
"tracking": {
"current_release_date": "2021-12-16T00:00:00.000Z",
"generator": {
"date": "2025-10-19T22:05:50.764Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-33909",
"initial_release_date": "2021-07-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-07-30T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2021-12-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added kernel to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 kernel 5.10.60.1-1",
"product": {
"name": "\u003ccm1 kernel 5.10.60.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 kernel 5.10.60.1-1",
"product": {
"name": "cm1 kernel 5.10.60.1-1",
"product_id": "16919"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.10.78.1-1",
"product": {
"name": "\u003ccbl2 kernel 5.10.78.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.10.78.1-1",
"product": {
"name": "cbl2 kernel 5.10.78.1-1",
"product_id": "16920"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 kernel 5.10.60.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 kernel 5.10.60.1-1 as a component of CBL Mariner 1.0",
"product_id": "16919-16820"
},
"product_reference": "16919",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.10.78.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.10.78.1-1 as a component of CBL Mariner 2.0",
"product_id": "16920-17086"
},
"product_reference": "16920",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"16919-16820",
"16920-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33909 fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations leading to an integer overflow an Out-of-bounds Write and escalation to root by an unprivileged user aka CID-8cae8cd89f05. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-33909.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-30T00:00:00.000Z",
"details": "-:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2021-07-30T00:00:00.000Z",
"details": "5.10.78.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations leading to an integer overflow an Out-of-bounds Write and escalation to root by an unprivileged user aka CID-8cae8cd89f05."
}
]
}
icsa-24-074-07
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of a privileged process.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Do not click web links or open attachments in unsolicited email messages.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-24-074-07 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-074-07.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-24-074-07 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC",
"tracking": {
"current_release_date": "2024-03-14T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-074-07",
"initial_release_date": "2024-03-14T06:00:00.000000Z",
"revision_history": [
{
"date": "2024-03-14T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.2",
"product": {
"name": "Siemens SIMATIC RF160B (6GT2003-0FA00): \u003cV2.2",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC RF160B (6GT2003-0FA00)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14491",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2017-18509",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-0338",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-9 Android ID: A-123700107",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0338"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-0417",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-154319182",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0417"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-10768",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10768"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-11301",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11301"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-14305",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u0027s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-14381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-15436",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15436"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-25705",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26555",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26558",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-29661",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0302",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1 Android-9 Android-10Android ID: A-155287782",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0302"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0305",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-154015447",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0305"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0325",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-174238784",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0325"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0326",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In p2p_copy_client_info of p2p.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi direct search, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172937525",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0326"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0327",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-172935267",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0327"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0328",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172670415",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0328"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0329",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In several native functions called by AdvertiseManager.java, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-171400004",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0329"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0330",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-170732441",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0330"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0331",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-170731783",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0331"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0333",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-168504491",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0333"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0334",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-163358811",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0334"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0336",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-158219161",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0336"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0337",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-157474195",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0337"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0339",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-145728687",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0339"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171980069",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0390",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174749461",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0390"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0391",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172841550",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0391"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0392",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-175124730",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0392"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0393",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-168041375",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0393"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0394",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172655291",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0394"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0396",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-160610106",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0396"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0397",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174052148",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0397"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0399",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-176919394References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0399"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0400",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-177561690",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0400"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0429",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175074139",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0429"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0431",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174149901",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0431"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0433",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171221090",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0433"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0434",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, a phishing attack is possible allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-167403112",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0434"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0435",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174150451",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0435"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0436",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out-of-bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496160",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0436"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0437",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176168330",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0437"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0438",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-152064592",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0438"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0443",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-170474245",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0443"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0444",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-178825358",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0444"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0471",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444786",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0471"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0473",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179687208",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0473"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0474",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-177611958",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0474"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0476",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-169252501",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0476"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0478",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-169255797",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0478"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0480",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-174493336",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0480"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0481",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-172939189",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0481"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0484",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-173720767",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0484"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0506",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-181962311",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0506"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0507",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181860042",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0507"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0508",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176444154",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0508"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444161",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0509"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0510",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444622",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0510"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0511",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-178055795",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0511"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0512",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-173843328References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0513",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-156090809",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0513"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0514",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-9, Android-11, Android-8.1 Android ID: A-162604069",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0514"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0515",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-167389063",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0515"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out-of-bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181660448",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0516"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-176533109",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0519"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0520",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-10 Android ID: A-176237595",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0520"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0521",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174661955",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0521"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0522",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out-of-bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-174182139",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0522"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0584",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In verifyBufferObject of Parcel.cpp, there is a possible out-of-bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-179289794",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0584"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0585",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-184963385",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0585"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0586",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-182584940",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0586"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0587",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185259758",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0587"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0588",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9 Android ID: A-177238342",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0588"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0589",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180939982",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0589"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0591",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179386960",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0591"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0593",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179386068",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0593"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0594",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176445224",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0594"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0596",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181346550",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0596"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0597",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496502",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0597"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0598",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180422108",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0598"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0599",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175614289",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0599"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0600",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-179042963",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0600"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0601",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out-of-bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-180643802",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0601"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0604",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179910660",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0604"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0640",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-187957589",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0640"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0641",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185235454",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0641"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0642",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-185126149",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0642"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0646",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-153352319",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0646"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0650",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-190286685",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0650"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0651",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In loadLabel of PackageItemInfo.java, there is a possible way to cause a denial of service in a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-67013844",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0651"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0652",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing objects that are not thread-safe. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185178568",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0652"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-177931370",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0653"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0682",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-159624555",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0682"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0683",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In runTraceIpcStop of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-185398942",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0683"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0684",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179839665",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0684"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0687",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-188913943",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0687"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0688",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-161149543",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0688"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0689",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-190188264",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0689"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0690",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-182152757",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0690"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0692",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-179289753",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0692"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0695",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In get_sock_stat of xt_qtaguid.c, there is a possible out-of-bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-184018316References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0695"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0704",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-179338675",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0704"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0706",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Android Versions: Android-10 Android-11Android ID: A-193444889",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0706"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0708",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In runDumpHeap of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-183262161",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0708"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0870",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In RW_SetActivatedTagType of rw_main.cc, memory corruption is possible due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-192472262",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0870"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0919",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-197336441",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0919"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196926917References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0926",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-191053931",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0926"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0928",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-188675581",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0928"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0929",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-187527909 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0929"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0930",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-181660091",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0930"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0931",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-180747689",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0931"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0933",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-172251622",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0933"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0952",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-195748381",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0952"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0953",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-184046278",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0953"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0961",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196046570References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0961"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0963",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199754277",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0963"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0964",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "summary",
"text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-193363621",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0964"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0965",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194300867",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0965"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0967",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In vorbis_book_decodev_set of codebook.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199065614",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0967"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0968",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197868577",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0968"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0970",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-196970023",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0970"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-1972",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1972"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-1976",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1976"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-29647",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an out-of-bounds write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-38204",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39621",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126319",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39621"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39623",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In doRead of SimpleDecodingSource.cpp, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194105348",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39623"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39626",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194695497",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39626"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39627",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126549",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39627"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39629",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197353344",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39629"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-150694665 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39633"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39634",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-204450605References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39634"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20127",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out-of-bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-221862119",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20127"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20130",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224314979",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20130"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20227",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In USB driver, there is a possible out-of-bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-216825460 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20227"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224536184",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20229"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20355",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-219498290",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20355"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20411",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-232023771",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20411"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239630375 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-237540956 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20423",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_set_response of rndis.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239842288 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20423"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20462",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230356196",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20462"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20466",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "summary",
"text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-179725730",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20466"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20468",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-228450451",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20468"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230867224",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20469"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20472",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239210579",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20472"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20473",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239267173",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20473"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20476",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-240936919",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20476"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20483",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out-of-bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-242459126",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20483"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20498",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246465319",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20498"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20500",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246540168",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20500"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
ICSA-24-074-07
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of a privileged process.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Do not click web links or open attachments in unsolicited email messages.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-24-074-07 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-074-07.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-24-074-07 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC",
"tracking": {
"current_release_date": "2024-03-14T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-074-07",
"initial_release_date": "2024-03-14T06:00:00.000000Z",
"revision_history": [
{
"date": "2024-03-14T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.2",
"product": {
"name": "Siemens SIMATIC RF160B (6GT2003-0FA00): \u003cV2.2",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC RF160B (6GT2003-0FA00)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14491",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2017-18509",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-0338",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-9 Android ID: A-123700107",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0338"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-0417",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-154319182",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0417"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-10768",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10768"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-11301",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11301"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-14305",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u0027s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-14381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-15436",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15436"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-25705",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26555",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26558",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-29661",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0302",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1 Android-9 Android-10Android ID: A-155287782",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0302"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0305",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-154015447",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0305"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0325",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-174238784",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0325"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0326",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In p2p_copy_client_info of p2p.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi direct search, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172937525",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0326"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0327",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-172935267",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0327"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0328",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172670415",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0328"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0329",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In several native functions called by AdvertiseManager.java, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-171400004",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0329"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0330",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-170732441",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0330"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0331",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-170731783",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0331"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0333",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-168504491",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0333"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0334",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-163358811",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0334"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0336",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-158219161",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0336"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0337",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-157474195",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0337"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0339",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-145728687",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0339"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171980069",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0390",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174749461",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0390"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0391",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172841550",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0391"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0392",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-175124730",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0392"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0393",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-168041375",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0393"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0394",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172655291",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0394"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0396",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-160610106",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0396"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0397",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174052148",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0397"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0399",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-176919394References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0399"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0400",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-177561690",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0400"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0429",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175074139",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0429"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0431",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174149901",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0431"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0433",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171221090",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0433"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0434",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onReceive of BluetoothPermissionRequest.java, a phishing attack is possible allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-167403112",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0434"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0435",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174150451",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0435"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0436",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out-of-bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496160",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0436"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0437",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176168330",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0437"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0438",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-152064592",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0438"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0443",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-170474245",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0443"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0444",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-178825358",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0444"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0471",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444786",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0471"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0473",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179687208",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0473"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0474",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-177611958",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0474"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0476",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-169252501",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0476"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0478",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-169255797",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0478"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0480",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-174493336",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0480"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0481",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-172939189",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0481"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0484",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-173720767",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0484"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0506",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-181962311",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0506"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0507",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181860042",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0507"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0508",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176444154",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0508"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444161",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0509"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0510",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444622",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0510"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0511",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-178055795",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0511"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0512",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-173843328References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0513",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-156090809",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0513"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0514",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-9, Android-11, Android-8.1 Android ID: A-162604069",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0514"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0515",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-167389063",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0515"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out-of-bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181660448",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0516"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-176533109",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0519"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0520",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-10 Android ID: A-176237595",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0520"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0521",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174661955",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0521"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0522",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out-of-bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-174182139",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0522"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0584",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In verifyBufferObject of Parcel.cpp, there is a possible out-of-bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-179289794",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0584"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0585",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-184963385",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0585"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0586",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-182584940",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0586"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0587",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185259758",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0587"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0588",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9 Android ID: A-177238342",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0588"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0589",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180939982",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0589"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0591",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179386960",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0591"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0593",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179386068",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0593"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0594",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176445224",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0594"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0596",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181346550",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0596"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0597",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496502",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0597"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0598",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180422108",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0598"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0599",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175614289",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0599"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0600",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-179042963",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0600"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0601",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out-of-bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-180643802",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0601"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0604",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179910660",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0604"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0640",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-187957589",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0640"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0641",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185235454",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0641"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0642",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-185126149",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0642"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0646",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-153352319",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0646"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0650",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-190286685",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0650"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0651",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In loadLabel of PackageItemInfo.java, there is a possible way to cause a denial of service in a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-67013844",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0651"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0652",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing objects that are not thread-safe. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185178568",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0652"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0653",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-177931370",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0653"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0682",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-159624555",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0682"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0683",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In runTraceIpcStop of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-185398942",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0683"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0684",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179839665",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0684"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0687",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-188913943",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0687"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0688",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-161149543",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0688"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0689",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-190188264",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0689"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0690",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-182152757",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0690"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0692",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-179289753",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0692"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0695",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In get_sock_stat of xt_qtaguid.c, there is a possible out-of-bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-184018316References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0695"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0704",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-179338675",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0704"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0706",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Android Versions: Android-10 Android-11Android ID: A-193444889",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0706"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0708",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In runDumpHeap of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-183262161",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0708"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0870",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In RW_SetActivatedTagType of rw_main.cc, memory corruption is possible due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-192472262",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0870"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0919",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-197336441",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0919"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0920",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196926917References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0926",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-191053931",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0926"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0928",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-188675581",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0928"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0929",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-187527909 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0929"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0930",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-181660091",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0930"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0931",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-180747689",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0931"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0933",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-172251622",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0933"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0952",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-195748381",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0952"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0953",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-184046278",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0953"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0961",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196046570References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0961"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0963",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "summary",
"text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199754277",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0963"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0964",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "summary",
"text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-193363621",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0964"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0965",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194300867",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0965"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0967",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In vorbis_book_decodev_set of codebook.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199065614",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0967"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0968",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197868577",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0968"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-0970",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "summary",
"text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-196970023",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0970"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-1972",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1972"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-1976",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1976"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-29647",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an out-of-bounds write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-38204",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39621",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126319",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39621"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39623",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In doRead of SimpleDecodingSource.cpp, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194105348",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39623"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39626",
"cwe": {
"id": "CWE-610",
"name": "Externally Controlled Reference to a Resource in Another Sphere"
},
"notes": [
{
"category": "summary",
"text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194695497",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39626"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39627",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126549",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39627"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39629",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197353344",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39629"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39633",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-150694665 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39633"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2021-39634",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-204450605References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39634"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20127",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out-of-bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-221862119",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20127"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20130",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224314979",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20130"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20227",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In USB driver, there is a possible out-of-bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-216825460 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20227"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224536184",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20229"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20355",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-219498290",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20355"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20411",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-232023771",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20411"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239630375 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-237540956 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20423",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_set_response of rndis.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239842288 References: Upstream kernel",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20423"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20462",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230356196",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20462"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20466",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "summary",
"text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-179725730",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20466"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20468",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-228450451",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20468"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230867224",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20469"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20472",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239210579",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20472"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20473",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239267173",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20473"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20476",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-240936919",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20476"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20483",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out-of-bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-242459126",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20483"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20498",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246465319",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20498"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-20500",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246540168",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20500"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
},
{
"category": "mitigation",
"details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
ghsa-6g4v-3wmh-w3jg
Vulnerability from github
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
{
"affected": [],
"aliases": [
"CVE-2021-33909"
],
"database_specific": {
"cwe_ids": [
"CWE-120",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-07-20T19:15:00Z",
"severity": "HIGH"
},
"details": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"id": "GHSA-6g4v-3wmh-w3jg",
"modified": "2022-08-11T00:00:28Z",
"published": "2022-05-24T19:08:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"type": "WEB",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU"
},
{
"type": "WEB",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210819-0004"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2021-33909
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-33909",
"description": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"id": "GSD-2021-33909",
"references": [
"https://www.suse.com/security/cve/CVE-2021-33909.html",
"https://www.debian.org/security/2021/dsa-4941",
"https://access.redhat.com/errata/RHSA-2021:2737",
"https://access.redhat.com/errata/RHSA-2021:2736",
"https://access.redhat.com/errata/RHSA-2021:2735",
"https://access.redhat.com/errata/RHSA-2021:2734",
"https://access.redhat.com/errata/RHSA-2021:2733",
"https://access.redhat.com/errata/RHSA-2021:2732",
"https://access.redhat.com/errata/RHSA-2021:2731",
"https://access.redhat.com/errata/RHSA-2021:2730",
"https://access.redhat.com/errata/RHSA-2021:2729",
"https://access.redhat.com/errata/RHSA-2021:2728",
"https://access.redhat.com/errata/RHSA-2021:2727",
"https://access.redhat.com/errata/RHSA-2021:2726",
"https://access.redhat.com/errata/RHSA-2021:2725",
"https://access.redhat.com/errata/RHSA-2021:2723",
"https://access.redhat.com/errata/RHSA-2021:2722",
"https://access.redhat.com/errata/RHSA-2021:2720",
"https://access.redhat.com/errata/RHSA-2021:2719",
"https://access.redhat.com/errata/RHSA-2021:2718",
"https://access.redhat.com/errata/RHSA-2021:2716",
"https://access.redhat.com/errata/RHSA-2021:2715",
"https://access.redhat.com/errata/RHSA-2021:2714",
"https://ubuntu.com/security/CVE-2021-33909",
"https://advisories.mageia.org/CVE-2021-33909.html",
"https://security.archlinux.org/CVE-2021-33909",
"https://alas.aws.amazon.com/cve/html/CVE-2021-33909.html",
"https://linux.oracle.com/cve/CVE-2021-33909.html",
"https://packetstormsecurity.com/files/cve/CVE-2021-33909"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-33909"
],
"details": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"id": "GSD-2021-33909",
"modified": "2023-12-13T01:23:19.096724Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33909",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"name": "DSA-4941",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"name": "FEDORA-2021-07dc0b3eb1",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"name": "[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"name": "[oss-security] 20210825 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"refsource": "MISC",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"name": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
"refsource": "CONFIRM",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"name": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"name": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210819-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.10.52",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.12.19",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.13.4",
"versionStartIncluding": "5.13",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.13",
"versionStartIncluding": "3.12.43",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.4.276",
"versionStartIncluding": "3.16",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.9.276",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.14.240",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.19.198",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.4.134",
"versionStartIncluding": "4.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.4.2-02044",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:sonicwall:sma1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33909"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
"refsource": "CONFIRM",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"name": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"name": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"name": "DSA-4941",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"name": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"name": "FEDORA-2021-07dc0b3eb1",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"name": "[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"name": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210819-0004/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"name": "[oss-security] 20210825 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux\u0027s filesystem layer",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-03-01T20:14Z",
"publishedDate": "2021-07-20T19:15Z"
}
}
}
fkie_cve-2021-33909
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/07/22/7 | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/25/10 | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/09/17/2 | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/09/17/4 | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/09/21/1 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | Mailing List, Patch, Vendor Advisory | |
| cve@mitre.org | https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b | Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/ | ||
| cve@mitre.org | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015 | Third Party Advisory | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20210819-0004/ | Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2021/dsa-4941 | Third Party Advisory | |
| cve@mitre.org | https://www.openwall.com/lists/oss-security/2021/07/20/1 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/07/22/7 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/25/10 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/09/17/2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/09/17/4 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/09/21/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210819-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4941 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2021/07/20/1 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| fedoraproject | fedora | 34 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| netapp | hci_management_node | - | |
| netapp | solidfire | - | |
| oracle | communications_session_border_controller | 8.2 | |
| oracle | communications_session_border_controller | 8.3 | |
| oracle | communications_session_border_controller | 8.4 | |
| oracle | communications_session_border_controller | 9.0 | |
| sonicwall | sma1000_firmware | * | |
| sonicwall | sma1000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39C4F3AF-A0E2-4B5A-8CEF-94A66639E158",
"versionEndExcluding": "3.13",
"versionStartIncluding": "3.12.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5597FD-F068-49B5-99FE-8CDB79CD7682",
"versionEndExcluding": "4.4.276",
"versionStartIncluding": "3.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C79FFC06-9530-4CD7-B651-01D786CC925E",
"versionEndExcluding": "4.9.276",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB359B2E-773D-4D52-9915-E07A47ABE72B",
"versionEndExcluding": "4.14.240",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B93AEDB9-C52B-4222-8F9A-882DAD9EF5B2",
"versionEndExcluding": "4.19.198",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "508D9771-335F-44A6-9F2F-880DF1267A1F",
"versionEndExcluding": "5.4.134",
"versionStartIncluding": "4.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E6FB6-53C8-4DC4-8AE5-93094BA39F62",
"versionEndExcluding": "5.10.52",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34C1A2F4-DD44-4CF1-8FD4-751A0D746A9E",
"versionEndExcluding": "5.12.19",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F93FA3CC-0C79-410B-A7D7-245C2AA0723A",
"versionEndExcluding": "5.13.4",
"versionStartIncluding": "5.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_session_border_controller:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9F6415-2950-49FE-9CAF-8BCA4DB6DF4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C05190B9-237F-4E2E-91EA-DB1B738864AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9C416FD3-2E2F-4BBC-BD5F-F896825883F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D886339E-EDB2-4879-BD54-1800E4CA9CAE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4BE1A7-14AA-4E0F-AA13-46D3B9D48F2F",
"versionEndIncluding": "12.4.2-02044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:sonicwall:sma1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB78952C-B6BB-4A5A-A216-BA64AAC83D4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05."
},
{
"lang": "es",
"value": "Un archivo fs/seq_file.c en el kernel de Linux versiones 3.16 hasta 5.13.x anteriores a 5.13.4, no restringe apropiadamente las asignaciones de b\u00faferes seq, conllevando a un desbordamiento de enteros, una escritura fuera de l\u00edmites y una escalada a root por parte de un usuario no privilegiado, tambi\u00e9n se conoce como CID-8cae8cd89f05"
}
],
"id": "CVE-2021-33909",
"lastModified": "2024-11-21T06:09:45.353",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-07-20T19:15:09.747",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/22/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/25/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/17/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/21/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210819-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4941"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.